Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSEP Topic 2 Question 70 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 70
Topic #: 2
[All ISSEP Questions]

Which of the following statements is true about residual risks

Show Suggested Answer Hide Answer
Suggested Answer: B

The types of cryptography defined by FIPS 185 are as follows:

Type I cryptography: It describes a cryptographic algorithm or a tool accepted by the National

Security Agency for protecting classified

information.

Type II cryptography: It describes a cryptographic algorithm or a tool accepted by the National

Security Agency for protecting

sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States

Code, or Section 3502(2) of Title

44, United States Code.

Type III cryptography: It describes a cryptographic algorithm or a tool accepted as a Federal

Information Processing Standard.

Type III (E) cryptography: It describes a Type III algorithm or a tool that is accepted for export from

the United States.


Contribute your Thoughts:

Dorian
15 days ago
Wait, is this a pop quiz or something? I thought we were just here to have a good time and learn about cybersecurity. Oh well, C it is!
upvoted 0 times
...
Elza
18 days ago
Ha! This is a classic trick question. If you don't know the difference between residual risk and inherent risk, you're in trouble. I'm going with C.
upvoted 0 times
...
Elin
18 days ago
Hmm, that's an interesting perspective. I can see how both answers could be valid depending on the context.
upvoted 0 times
...
Shelia
20 days ago
I disagree, I believe the answer is C) It is the probabilistic risk after implementing all security measures.
upvoted 0 times
...
Elin
22 days ago
I think the answer is A) It can be considered as an indicator of threats coupled with vulnerability.
upvoted 0 times
...
Van
23 days ago
But wouldn't residual risks still exist even after implementing all security measures?
upvoted 0 times
...
Josue
25 days ago
Hmm, I'm not sure about that. I was thinking option D sounded more like the definition of residual risk. Guess I need to review my notes again.
upvoted 0 times
...
Edna
25 days ago
I disagree, I believe the answer is C) It is the probabilistic risk after implementing all security measures.
upvoted 0 times
...
Anika
29 days ago
I think option C is the correct answer. Residual risk is the probabilistic risk that remains after implementing all security measures.
upvoted 0 times
...
Van
1 months ago
I think the answer is A) It can be considered as an indicator of threats coupled with vulnerability.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77