Lab Risk Analysis Answer Key
Lab Risk Analysis Answer Key
Objectives
Part 1: Use Risk Analysis Methods
Part 2: Calculate Risks
Background / Scenario
A risk analysis determines possible vulnerabilities and threats, their likelihood and consequences, and the
tolerances for such events. The results of this process may be expressed by using a quantitative method or a
qualitative method. Quantitative risk analysis involves calculations to assign a value to a potential vulnerability
or threat. This option works best when dealing with tangible assets such as buildings, computers, or
inventory. Qualitative risk analysis assigns a level used to prioritize potential risk so organizations can take a
logical approach to address the most critical threats. This method works best for intangible assets such as
intellectual property, company reputation, or accounts receivable.
Required Resources
PC or mobile device with internet access
Instructions
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 10
Lab - Risk Analysis
Questions:
Given an example, what is the impact on the server if the server room floods and the cost to restore the
server is $30,000?
Asset Value: $135,000
Restoration Cost: $30,000
Exposure Factor:
Type your answers here.
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 10
Lab - Risk Analysis
Question:
What is the ARO of hardware failures with the customer database server?
Type your answers here.
What is the ALE of a hardware failure with the customer database server if the SLE= $5,000 and ARO=2.5?
Type your answers here.
What is the ALE of a hacking attack with the customer database server if the SLE= $10,000 and ARO=0.5?
Type your answers here
Use the tables to record the qualitative impact of the events described below.
Questions:
In the first event, the web server experiences a hard drive failure causing a loss of revenue, reputation, and
customers. This is a very high risk impact and a possible probability of occurrence.
Probability of
Occurrence Very Low Low Medium High Very High
Highly Probable Moderate Major Major Severe Severe
Probable Moderate Moderate Major Major Severe
Possible Minor Moderate Moderate Moderate Major
Unlikely Minor Moderate Moderate Moderate Major
Rare Minor Minor Minor Moderate Moderate
Blank Line, No additional information
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 10
Lab - Risk Analysis
In the second event, a denial-of service attack launches against the web server. This is a high risk impact and
a probable probability of occurrence.
Probability of
Occurrence Very Low Low Medium High Very High
Highly Probable Moderate Major Major Severe Severe
Probable Moderate Moderate Major Major Severe
Possible Minor Moderate Moderate Moderate Major
Unlikely Minor Moderate Moderate Moderate Major
Rare Minor Minor Minor Moderate Moderate
Blank Line, No additional information
In the third event, there is a fire in the server room. This is a very high risk impact and a rare probability of
occurrence.
Probability of
Occurrence Very Low Low Medium High Very High
Highly Probable Moderate Major Major Severe Severe
Probable Moderate Moderate Major Major Severe
Possible Minor Moderate Moderate Moderate Major
Unlikely Minor Moderate Moderate Moderate Major
Rare Minor Minor Minor Moderate Moderate
Blank Line, No additional information
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 10
Lab - Risk Analysis
In the fourth event, credit card data has been stolen. This is a very high risk impact and an unlikely probability
of occurrence.
Probability of
Occurrence Very Low Low Medium High Very High
Highly Probable Moderate Major Major Severe Severe
Probable Moderate Moderate Major Major Severe
Possible Minor Moderate Moderate Moderate Major
Unlikely Minor Moderate Moderate Moderate Major
Rare Minor Minor Minor Moderate Moderate
Blank Line, No additional information
In the fifth event, there is a tornado in the area. This is a low risk impact and a rare probability of occurrence.
Event 5: Weather/Tornado
ABC Company owns 65 laptops. Each laptop cost $1,200. You will base your calculations on the value of one
laptop. The team identified three threats. Based on internal data, calculate the ARO, and ALE given the
information provided. Enter the missing values in the table.
Theft of Equipment $1200 100% (1.0) Once every 2 years Blank $600
Damage by Dropping blank 60%(0.6) Once every 5 years 0.2 $144
Malware $240 20% (0.2) Twice a year 2 blank
Total ALE for all threats blank
Blank Line, No additional information
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 10
Lab - Risk Analysis
The ABC Company is performing a risk analysis for its storage area network. The total asset value is
$250,000. The team identified the three threats shown in the table. Manufacturer’s data and company records
provided the data given in the table. Enter the missing values in the table.
ABC Company spent $18,000 on a database server. Configuration and installation totaled $2,000. Complete
the risk analysis challenge table based on the four threats identified by the team at ABC. Enter the missing
values in the table.
ABC Company spent $10,000 on their remote point-of-sale system. Configuration and installation totaled
$5,000. Complete the table based on the four threats identified by the team at ABC. Enter the missing values
in the table.
Theft of Equipment blank 100% (1.0) Once every 5 years 0.2 blank
Equipment Failure $1,500 10% (0.1) Twice a year blank blank
Ransomware blank 20% (.2) Once every 10 years blank blank
Data Breach $6,000 40% (0.4) Once every 5 years 0.2 Blank
Total ALE for all threats Blank
Blank Line, No additional information
BC Company spent $500,000 on the development and purchase of a private cloud facility. Configuration and
installation totaled $50,000 and the programming and application development cost another $450,000.
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 10
Lab - Risk Analysis
Complete the Risk analysis Challenge table based on the four threats identified by the team at ABC. Enter the
missing values in the table.
Power Outage blank 50% (0.5) Once every 5 years blank $100,000
DOS/DDOS Attack blank 40% (0.4) Once every 2 years blank $200,000
Data Breach blank 40% (0.4) Once every 10 years blank blank
Flood blank 100% (1.0) Once every 20 years blank Blank
Total ALE for all threats Blank
Blank Line, No additional information
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 10
Lab - Risk Analysis
Answer Key
Part 1: Use Risk Analysis Methods
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of 10
Lab - Risk Analysis
In the second event, a denial-of service attack launches against the web server. This is a high risk impact and
a probable probability of occurrence.
The correct answer is Major.
In the third event, there is a fire in the server room. This is a very high risk impact and a rare probability of
occurrence.
The correct answer is Moderate.
In the fourth event, credit card data has been stolen. This is a very high risk impact and an unlikely probability
of occurrence.
The correct answer is Major.
In the fifth event, there is a tornado in the area. This is a low risk impact and a rare probability of occurrence.
The correct answer is Minor.
Theft of Equipment $1200 100% (1.0) Once every 2 years 0.5 $600
Damage by Dropping $720 60%(0.6) Once every 5 years 0.2 $144
Malware $240 20% (0.2) Twice a year 2 $480
Total ALE for all threats $1,224
Blank Line, No additional information
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 9 of 10
Lab - Risk Analysis
Theft of Equipment $15,000 100% (1.0) Once every 5 years 0.2 $3,000
Equipment Failure $1,500 10% (0.1) Twice a year 2 $3,000
Ransomware $3,000 20% (0.2) Once every 10 years 0.1 $300
Data Breach $6,000 40% (0.4) Once every 5 years 0.2 $1,200
Total ALE for all threats $7,500
Blank Line, No additional information
© 2021 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 10 of 10