Bash, the Crucial Exams Chat Bot
AI Bot

Risk Management Fundamentals Flashcards

ISC2 Certified in Cybersecurity (CC) Flashcards

Study our Risk Management Fundamentals flashcards for the ISC2 Certified in Cybersecurity (CC) exam with 30+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
ISC2 Certified in Cybersecurity (CC) Course Header Image
FrontBack
Define quantitative risk assessmentA method that uses numerical values to assess likelihood and impact
Define risk assessmentThe process of analyzing potential risks by determining their likelihood and impact
How does insurance assist in risk managementBy transferring financial consequences of certain risks to an insurer
What are the main components of a risk assessmentIdentifying assets, threats, vulnerabilities, likelihood, impact
What does 'defense in depth' mean in cybersecurity risk managementA layered approach to security to mitigate risks at multiple levels
What does risk mitigation involveImplementing strategies to reduce the likelihood or impact of identified risks
What does the term 'impact assessment' meanEvaluating the consequences of a risk event occurring
What does the term "risk appetite" meanThe level of risk an organization is willing to accept
What is a common tool for visualizing risksA risk matrix or heat map
What is a key principle of risk communicationEnsuring all stakeholders understand the risks and management strategies
What is a threat actorAn individual, group, or entity that poses a threat to an organization
What is a vulnerability in the context of risk managementA weakness that can be exploited by a threat
What is an example of a risk mitigation strategyInstalling firewalls to prevent unauthorized access
What is meant by 'risk avoidance'An approach where risks are eliminated by avoiding activities that create them
What is meant by 'risk transfer'Shifting the consequences of a risk to a third party, such as through insurance
What is residual riskThe level of risk that remains after mitigation strategies are applied
What is risk managementThe process of identifying, assessing, and responding to risks to minimize their impact on objectives
What is the difference between a threat and a riskA threat is a potential danger, while a risk is the likelihood and impact of that danger occurring
What is the difference between proactive and reactive risk managementProactive involves anticipating and addressing risks before they occur; reactive involves responding to risks after they occur
What is the first step in risk managementRisk identification
What is the goal of risk prioritizationTo determine which risks to address first based on severity and likelihood
What is the NIST Risk Management FrameworkA structured approach to managing cybersecurity risks developed by the National Institute of Standards and Technology
What is the purpose of a control measure in cybersecurityTo reduce the likelihood or impact of a risk
What is the purpose of a risk registerA tool to document and monitor risks and their management plans
What is the role of a qualitative risk assessmentTo evaluate risks based on non-numeric criteria such as judgement or experience
What is the role of incident response in risk managementTo manage and limit damage after a cybersecurity event occurs
What is the significance of compliance in risk managementAdherence to regulations and standards reduces risks associated with legal and financial penalties
When is risk acceptance usedWhen the cost of mitigation exceeds the value or likelihood of the risk
Why is continuous monitoring important in risk managementTo ensure new risks are identified and managed promptly
Why is risk management essential in cybersecurityTo protect systems, data, and processes from vulnerabilities and threats

About the Flashcards

Flashcards for the ISC2 Certified in Cybersecurity (CC) exam help students review core risk management terminology and concepts used in cybersecurity. Cards cover processes such as risk identification, risk assessment (qualitative and quantitative), prioritization, and mitigation, plus definitions of threats, vulnerabilities, residual risk, and common control measures.

The deck reinforces tools and practices tested on the exam, including risk registers, risk matrices and heat maps, the NIST Risk Management Framework, incident response, compliance, and approaches like risk avoidance, transfer (insurance), and acceptance. It also emphasizes continuous monitoring, impact assessment, defense in depth, and effective risk communication for stakeholders.

Topics covered in this flashcard deck:

  • Risk management process
  • Risk assessment methods
  • Threats and vulnerabilities
  • Mitigation strategies and controls
  • Risk registers and monitoring
  • NIST Risk Management Framework
Share on...
Follow us on...