Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 712-50 All Questions

View all questions & answers for the 712-50 exam

Exam 712-50 topic 1 question 53 discussion

Actual exam question from ECCouncil's 712-50
Question #: 53
Topic #: 1
[All 712-50 Questions]

What is the definition of Risk in Information Security?

  • A. Risk = Probability x Impact
  • B. Risk = Impact x Threat
  • C. Risk = Threat x Probability
  • D. Risk = Financial Impact x Probability
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
nshams
4 months, 3 weeks ago
chance of occuring an incident like earthquake and outcome of it which is the impact combines total risk
upvoted 1 times
...
Mr_Magoo1518
1 year ago
How is risk calculated in security? Risk is the combination of the probability of an event and its consequence. In general, this can be explained as: Risk = Likelihood × Impact. In particular, IT risk is the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise.
upvoted 2 times
...
arifbhatkar
1 year, 5 months ago
Answer should be C: Risk = Threat x Probability
upvoted 1 times
...
Boats
1 year, 6 months ago
Selected Answer: A
Risk is the combination of the probability of an event and its consequence. In general, this can be explained as: Risk = Likelihood × Impact.
upvoted 1 times
...
Pika26
1 year, 8 months ago
Answer is C. C. In Information Security, the definition of Risk is: Risk = Threat x Probability. Risk refers to the potential for harm or loss resulting from a threat exploiting a vulnerability. A threat is any potential danger that could harm or compromise the confidentiality, integrity, or availability of an organization's information assets. Probability refers to the likelihood of a threat exploiting a vulnerability, while vulnerability is a weakness or gap in an organization's security defenses that could be exploited by a threat. By multiplying the likelihood of a threat exploiting a vulnerability (i.e., probability) by the potential impact of a successful attack (i.e., threat), organizations can determine the level of risk associated with a particular information asset or system. This formula allows organizations to quantify and prioritize risks and determine appropriate risk treatment strategies.
upvoted 2 times
...
boyladdudeman
3 years, 8 months ago
A is correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...