In: Operations Management
Fill in the blanks: ________ and ________ interact to create risk (note: order is not important).
A) Threats, Consequences
B) Hazards, Vulnerabilities
c) Likelihoods, Consequences
Question 2
Which of the following best describes a dormant hazard
A) A situation wherein the hazard is in the position to affect persons, property, or environment
B) A situation wherein the hazard is certain to cause loss
C) A situation that has the potential to be hazardous, but nothing of value is exposed to it
Question 3
According to the DHS lexicon, which of the following is the definition for the word "vulnerability" (as a notion)?
A) A physical feature or operational attribute that renders an entity, asset, system, network, or geographic area open to exploitation or susceptible to a given hazard
B) A natural or man-made occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property
C) The potential for an unwanted outcome resulting from an incident, event, or occurrence, as determined by its likelihood and the associated consequences
Question 4
according to James Matschulat, what is the keystone of effective risk management?
A) A complete understanding of risk
B) A systematic process that takes a comprehensive view of the problem
C) Reflecting on the past to obtain clues for the future
Question 5
Which of the following best describes the difference between a pure risk and a speculative risk?
A) A pure risk is one that is well understood; a speculative risk is one that requires further study to understand
B) A pure risk presents the possibility of loss or no loss; a speculative risk also presents the possibility of gain
C) Both consider benefits as the reason for assuming risk
Question 6
Which of the following is an example of a speculative risk?
A) Development of new security technologies for the homeland security marketplace
B) Over-reliance on a single fish ladder to allow salmon to migrate upstream on the Colorado river
C) Blackmail that exploits closely held secrets that relate to how others might perceive your credibility
Question 7
What form does the answer to the third question of risk assessment take?
A) Set of possible scenarios
B) Valuation of scenarios
C) Strategies for dealing with scenarios
Question 8
Which of the following is NOT one of the phases of risk management?
A) Risk Assessment
B) Risk Analysis
C) Risk Communication
Question 9
The final product of a risk assessment (a.k.a. the deliverable) would include a summary of answers to all but which of the following questions?
A) What can happen?
B) What can be done?
C) Is the risk acceptable?
Question 10
Following the occurrence of a security incident affecting a network of computer systems, the afflicted company suffered immediate losses in excess of $10 million, a downtime in excess of a month, and with impacts felt across the entire company. Which of the following elements of the logic of loss refers to why this loss matters?
A) Extent of Loss
B) Consequences of Loss
C) Appearance of Loss
Here are the correct options:
Q1- A) Threats, Consequences
Q2- C) A situation that has the potential to be hazardous, but nothing of value is exposed to it
Q3- A) A physical feature or operational attribute that renders an entity, asset, system, network, or geographic area open to exploitation or susceptible to a given hazard
Q4- A) A complete understanding of risk
Q5- B) A pure risk presents the possibility of loss or no loss; a speculative risk also presents the possibility of gain
Q6- A) Development of new security technologies for the homeland security marketplace
Q7- B) Valuation of scenarios
Q8- B) Risk Analysis
Q9- C) Is the risk acceptable?
Q10- B) Consequences of Loss