Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

BCS Exam CISMP-V9 Topic 2 Question 101 Discussion

Actual exam question for BCS's CISMP-V9 exam
Question #: 101
Topic #: 2
[All CISMP-V9 Questions]

When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?

Show Suggested Answer Hide Answer
Suggested Answer: A

In the context of information security, risk is typically calculated as the product of likelihood and impact. This formula encapsulates the probability of a vulnerability being exploited (likelihood) and the potential damage or loss that could result from such an event (impact). The goal is to quantify the level of risk in order to prioritize mitigation efforts effectively. Options B, C, and D do not represent standard risk calculation formulas in information security management.


Contribute your Thoughts:

Dion
2 days ago
Duh, it's obviously A. Likelihood and impact are the two key factors in calculating risk. Seems pretty straightforward to me.
upvoted 0 times
...
Brice
6 days ago
I think the risk is calculated by multiplying the likelihood and impact.
upvoted 0 times
...

Save Cancel