Part I. True or False: Place a T or an F, whichever you consider correct, in the box before each
numbered statement
1.
“Security by obscurity” refers to relying on the attacker\'s ignorance of the design of a system.
2.
Theory of asymmetric information can be used to explain how bad products tend to drive out the
good products in a market.
3.
Enterprise risk management differs from “traditional” systems engineering risk management in
the expanse of the consequence space within which risks affect enterprise goals, mission
outcomes, or capabilities.
4.
Emergence can be described as the appearance of new and unforeseen system properties which
cannot be know before the system operates.
5.
Emergence can be totally and completely prevented by thorough system design.
6.
The process of system identification followed by risk estimation is what is truly occurring in risk
assessments.
7.
Systems theory supports the modern view that risk itself is an observer-dependent phenomenon;
a relational property between the situation and the observer.
8.
Reliance can be described as consistency in performance over time.
9.
In Liontief I-O model for inoperability, resulting % inoperability can be caused by perturbation
h and also by dependence among sub-systems.
10.
Tightly coupled systems imply that what occurs in one system directly affects what happens in
another.
11.
The two descriptors of Complexity for the purpose of Risk Management are (1) Interactions
among subsystems and (2) Reliability among subsystems.
12.
Partially observable events can be recorded only at a particular threshold of magnitude, time,
etc.
13.
Privacy and ethical issues can be factors in the observability of events.
14.
Readiness and effectiveness for asset protection is one of the cost factors in a DRP.
15.
Maximax is a method of decision making using probabilities.
16.
Maximin tries to minimize regret of decision makers.
17.
Rational decision maker should be willing to pay for perfect information at a price equal to or
more than the EVPI.
18.
Decision making under uncertainty is when probabilities can be assigned to the occurrence of
states of nature in the future.
19.
In Hurwicz method, the coefficient of optimism is a measure of a decision maker’s optimism
from 0 (completely optimistic) to 1 (completely pessimistic).
20.
In the pebble-in-the-pond metaphor, the ripples represent the consequences and the number of
ripples decreases as time passes.
21.
Bounded rationality states that people have limited cognitive processing capacity and simply
cannot perform complex optimization tasks in their head.
22.
When risks are being identified, it is not essential that subject matter experts from all the
engineering disciplines participate.
23.
An ordinal scale is a measurement scale in which attributes are assigned a number that
represents order.
24.
Risk Cubes can not involve human’s numerical judgment on risk.
25.
Wear-and-tear indicates a scenario where the effects of an adverse condition read.
Part I. True or False Place a T or an F, whichever you consider cor.pdf
1. Part I. True or False: Place a T or an F, whichever you consider correct, in the box before each
numbered statement
1.
“Security by obscurity” refers to relying on the attacker's ignorance of the design of a system.
2.
Theory of asymmetric information can be used to explain how bad products tend to drive out the
good products in a market.
3.
Enterprise risk management differs from “traditional” systems engineering risk management in
the expanse of the consequence space within which risks affect enterprise goals, mission
outcomes, or capabilities.
4.
Emergence can be described as the appearance of new and unforeseen system properties which
cannot be know before the system operates.
5.
Emergence can be totally and completely prevented by thorough system design.
6.
The process of system identification followed by risk estimation is what is truly occurring in risk
assessments.
7.
Systems theory supports the modern view that risk itself is an observer-dependent phenomenon;
a relational property between the situation and the observer.
8.
Reliance can be described as consistency in performance over time.
9.
In Liontief I-O model for inoperability, resulting % inoperability can be caused by perturbation
h and also by dependence among sub-systems.
10.
Tightly coupled systems imply that what occurs in one system directly affects what happens in
another.
11.
The two descriptors of Complexity for the purpose of Risk Management are (1) Interactions
among subsystems and (2) Reliability among subsystems.
12.
2. Partially observable events can be recorded only at a particular threshold of magnitude, time,
etc.
13.
Privacy and ethical issues can be factors in the observability of events.
14.
Readiness and effectiveness for asset protection is one of the cost factors in a DRP.
15.
Maximax is a method of decision making using probabilities.
16.
Maximin tries to minimize regret of decision makers.
17.
Rational decision maker should be willing to pay for perfect information at a price equal to or
more than the EVPI.
18.
Decision making under uncertainty is when probabilities can be assigned to the occurrence of
states of nature in the future.
19.
In Hurwicz method, the coefficient of optimism is a measure of a decision maker’s optimism
from 0 (completely optimistic) to 1 (completely pessimistic).
20.
In the pebble-in-the-pond metaphor, the ripples represent the consequences and the number of
ripples decreases as time passes.
21.
Bounded rationality states that people have limited cognitive processing capacity and simply
cannot perform complex optimization tasks in their head.
22.
When risks are being identified, it is not essential that subject matter experts from all the
engineering disciplines participate.
23.
An ordinal scale is a measurement scale in which attributes are assigned a number that
represents order.
24.
Risk Cubes can not involve human’s numerical judgment on risk.
25.
Wear-and-tear indicates a scenario where the effects of an adverse condition readily propagate
to other systems or subsystems.
3. 26.
Because the distance between values in an ordinal scale is arbitrary, arithmetic operations on
ordinal data are permissible.
27.
Borda algorithm transforms an interval scale into ordinal scale, permitting the summing of
scores.
28.
The conscious decision to accept the associated level of risk without engaging in special efforts
to control it is one method to handle risk.
Solution
1ANS)T
2ans) f
3ans) T
4ans) f
5ans) f
6ans) T
according to chegg policy only 1st four should be answered for remaing answers please post in
seperate questions