Question
KeepMoving Risk Assessment
Below is the risk assessment for the KeepMoving app, found in the readings. Use it to answer the questions.
Question 1
In the KeepMoving risk assessment, "project schedule being overrun" is listed as a medium likelihood, low severity, and has an avoid response. Which of the following might be the way in which KeepMoving developers address avoiding this risk?(1 point)
Responses
Do not set deadlines or a release date, so that developers can work at their own pace.
Do not set deadlines or a release date, so that developers can work at their own pace.
Establish a development schedule that allots the appropriate amount of time for each major step in the software development life cycle.
Establish a development schedule that allots the appropriate amount of time for each major step in the software development life cycle.
If the project runs past schedule, most the project to a different development team within your company.
If the project runs past schedule, most the project to a different development team within your company.
If the project runs past schedule, try a social media post that asks users to be patient just a little bit longer.
If the project runs past schedule, try a social media post that asks users to be patient just a little bit longer.
Question 2
Using the KeepMoving risk assessment above, which of the following risks would NOT make use of an avoid response?(1 point)
Responses
Sensitive data is sold to third-party companies
Sensitive data is sold to third-party companies
Sensitive health data might be intercepted over WiFi or data
Sensitive health data might be intercepted over WiFi or data
KeepMoving might contain vulnerabilities in the code that allow for modification of settings or malicious attacks
KeepMoving might contain vulnerabilities in the code that allow for modification of settings or malicious attacks
Some of the developers on the core team decide to quit.
Some of the developers on the core team decide to quit.
Question 3
Using the KeepMoving risk assessment above, place the risks in order of highest severity to lowest severity, from top to bottom.(3 points)
Arrange responses in the correct order to answer the question. Select a response, navigate to the desired position and insert response at that position. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can be moved using the up and down arrow keys or by dragging with a mouse.
Question 4
A risk that you might not initially think of is a facility fire. To help with this risk, business purchase insurance, which covers them in case of a multitude of issues. In that scenario, the risk is absorbed by the insurance company, who will pay to replace or rebuild the facility, should something like a fire occur. What type of risk response is this?(1 point)
Responses
Mitigate
Mitigate
Transfer
Transfer
Accept
Accept
Avoid
Avoid
Question 5
Match the correct illustration with the appropriate risk response.(3 points)
Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse.
Transfer
Mitigate
Avoid
Question 6
Which of the following is NOT an example of preventative security measures for organizations?(1 point)
Responses
Allow full access of employees' personal devices to the network.
Allow full access of employees' personal devices to the network.
Use an antivirus system to prevent, detect, and remove viruses.
Use an antivirus system to prevent, detect, and remove viruses.
Use failover methods, where if one server goes down, another server immediately and seamlessly takes its place; users should not notice any disruption.
Use failover methods, where if one server goes down, another server immediately and seamlessly takes its place; users should not notice any disruption.
Use a robust firewall to block unauthorized network access.
Use a robust firewall to block unauthorized network access.
Question 7
Which of the following measures should be used to help prevent risks while using a mobile device?(1 point)
Responses
Update the operating system frequently.
Update the operating system frequently.
Allow your device to be unlocked with a single button or swipe.
Allow your device to be unlocked with a single button or swipe.
Don't backup mobile phone data to your computer where it can be stolen.
Don't backup mobile phone data to your computer where it can be stolen.
Jailbreak your device to install any application on it.
Jailbreak your device to install any application on it.
Question 8
Which of the following preventative measures should organizations use against hacks?(1 point)
Responses
Only use third-party programming language libraries that are trustworthy and dependable.
Only use third-party programming language libraries that are trustworthy and dependable.
Employ white hat (ethical) hackers to perform penetration testing on the application, a process of trying to hack into the software in order to identify security weaknesses.
Employ white hat (ethical) hackers to perform penetration testing on the application, a process of trying to hack into the software in order to identify security weaknesses.
Log any application errors so that they can be fixed.
Log any application errors so that they can be fixed.
All of the above.
All of the above.
Question 9
Classify the following troubleshooting steps as being a response to hardware failure or software failure(3 points)
Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse.
Hardware Software
Below is the risk assessment for the KeepMoving app, found in the readings. Use it to answer the questions.
Question 1
In the KeepMoving risk assessment, "project schedule being overrun" is listed as a medium likelihood, low severity, and has an avoid response. Which of the following might be the way in which KeepMoving developers address avoiding this risk?(1 point)
Responses
Do not set deadlines or a release date, so that developers can work at their own pace.
Do not set deadlines or a release date, so that developers can work at their own pace.
Establish a development schedule that allots the appropriate amount of time for each major step in the software development life cycle.
Establish a development schedule that allots the appropriate amount of time for each major step in the software development life cycle.
If the project runs past schedule, most the project to a different development team within your company.
If the project runs past schedule, most the project to a different development team within your company.
If the project runs past schedule, try a social media post that asks users to be patient just a little bit longer.
If the project runs past schedule, try a social media post that asks users to be patient just a little bit longer.
Question 2
Using the KeepMoving risk assessment above, which of the following risks would NOT make use of an avoid response?(1 point)
Responses
Sensitive data is sold to third-party companies
Sensitive data is sold to third-party companies
Sensitive health data might be intercepted over WiFi or data
Sensitive health data might be intercepted over WiFi or data
KeepMoving might contain vulnerabilities in the code that allow for modification of settings or malicious attacks
KeepMoving might contain vulnerabilities in the code that allow for modification of settings or malicious attacks
Some of the developers on the core team decide to quit.
Some of the developers on the core team decide to quit.
Question 3
Using the KeepMoving risk assessment above, place the risks in order of highest severity to lowest severity, from top to bottom.(3 points)
Arrange responses in the correct order to answer the question. Select a response, navigate to the desired position and insert response at that position. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can be moved using the up and down arrow keys or by dragging with a mouse.
Question 4
A risk that you might not initially think of is a facility fire. To help with this risk, business purchase insurance, which covers them in case of a multitude of issues. In that scenario, the risk is absorbed by the insurance company, who will pay to replace or rebuild the facility, should something like a fire occur. What type of risk response is this?(1 point)
Responses
Mitigate
Mitigate
Transfer
Transfer
Accept
Accept
Avoid
Avoid
Question 5
Match the correct illustration with the appropriate risk response.(3 points)
Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse.
Transfer
Mitigate
Avoid
Question 6
Which of the following is NOT an example of preventative security measures for organizations?(1 point)
Responses
Allow full access of employees' personal devices to the network.
Allow full access of employees' personal devices to the network.
Use an antivirus system to prevent, detect, and remove viruses.
Use an antivirus system to prevent, detect, and remove viruses.
Use failover methods, where if one server goes down, another server immediately and seamlessly takes its place; users should not notice any disruption.
Use failover methods, where if one server goes down, another server immediately and seamlessly takes its place; users should not notice any disruption.
Use a robust firewall to block unauthorized network access.
Use a robust firewall to block unauthorized network access.
Question 7
Which of the following measures should be used to help prevent risks while using a mobile device?(1 point)
Responses
Update the operating system frequently.
Update the operating system frequently.
Allow your device to be unlocked with a single button or swipe.
Allow your device to be unlocked with a single button or swipe.
Don't backup mobile phone data to your computer where it can be stolen.
Don't backup mobile phone data to your computer where it can be stolen.
Jailbreak your device to install any application on it.
Jailbreak your device to install any application on it.
Question 8
Which of the following preventative measures should organizations use against hacks?(1 point)
Responses
Only use third-party programming language libraries that are trustworthy and dependable.
Only use third-party programming language libraries that are trustworthy and dependable.
Employ white hat (ethical) hackers to perform penetration testing on the application, a process of trying to hack into the software in order to identify security weaknesses.
Employ white hat (ethical) hackers to perform penetration testing on the application, a process of trying to hack into the software in order to identify security weaknesses.
Log any application errors so that they can be fixed.
Log any application errors so that they can be fixed.
All of the above.
All of the above.
Question 9
Classify the following troubleshooting steps as being a response to hardware failure or software failure(3 points)
Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse.
Hardware Software
Answers
GPT-4o mini
Certainly! Here are the answers based on the provided risk assessment for the KeepMoving app:
### Question 1
**Establish a development schedule that allots the appropriate amount of time for each major step in the software development life cycle.**
### Question 2
**Some of the developers on the core team decide to quit.**
### Question 3
(Ordered from highest severity to lowest severity)
1. Sensitive data is sold to third-party companies
2. Sensitive health data might be intercepted over WiFi or data
3. KeepMoving might contain vulnerabilities in the code that allow for modification of settings or malicious attacks
4. Some of the developers on the core team decide to quit.
### Question 4
**Transfer**
### Question 5
(Responses matched with appropriate risk response)
1. **Transfer** - Purchasing insurance for facility fire.
2. **Mitigate** - Implementing security measures like firewalls and health checks.
3. **Avoid** - Setting development schedules to prevent project overruns.
### Question 6
**Allow full access of employees' personal devices to the network.**
### Question 7
**Update the operating system frequently.**
### Question 8
**All of the above.**
### Question 9
(Responses classified)
- **Hardware**: Troubleshooting steps related to physical components, e.g., replacing hard drives, checking cables.
- **Software**: Troubleshooting steps related to programs and applications, e.g., reinstalling software, checking for updates.
Please let me know if there's anything else you need!
### Question 1
**Establish a development schedule that allots the appropriate amount of time for each major step in the software development life cycle.**
### Question 2
**Some of the developers on the core team decide to quit.**
### Question 3
(Ordered from highest severity to lowest severity)
1. Sensitive data is sold to third-party companies
2. Sensitive health data might be intercepted over WiFi or data
3. KeepMoving might contain vulnerabilities in the code that allow for modification of settings or malicious attacks
4. Some of the developers on the core team decide to quit.
### Question 4
**Transfer**
### Question 5
(Responses matched with appropriate risk response)
1. **Transfer** - Purchasing insurance for facility fire.
2. **Mitigate** - Implementing security measures like firewalls and health checks.
3. **Avoid** - Setting development schedules to prevent project overruns.
### Question 6
**Allow full access of employees' personal devices to the network.**
### Question 7
**Update the operating system frequently.**
### Question 8
**All of the above.**
### Question 9
(Responses classified)
- **Hardware**: Troubleshooting steps related to physical components, e.g., replacing hard drives, checking cables.
- **Software**: Troubleshooting steps related to programs and applications, e.g., reinstalling software, checking for updates.
Please let me know if there's anything else you need!