Search Header Logo
Module 11 - 13: Data, Risk, Governance

Module 11 - 13: Data, Risk, Governance

Assessment

Presentation

Computers

University

Hard

Created by

Iwin Ross

Used 1+ times

FREE Resource

36 Slides • 26 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

media

8

media

9

media

10

Multiple Choice

Not designed for any specific entity, the act mandates the implementation of risk assessments, internal controls and audit procedures.

1

Gramm-Leach-Bliley Act (GLBA)

2

Sarbanes-Oxley Act (SOX)

3

Computer Security Act

4

Federal information Security Management Act (FISMA)

11

Multiple Choice

One of the earliest requires federal agencies to develop security policies for computer systems that process confidential information.

1

Computer Security Act

2

Gramm-Leach-Bliley Act (GLBA)

3

Sarbanes-Oxley Act (SOX)

4

Federal information Security Management Act (FISMA)

12

Multiple Choice

Provide best practices of an overall Information Security Management System (ISMS)

1

ISO 27000

2

ISO 31000

3

ISO 10000

4

GPR 27000

13

Fill in the Blanks

Type answer...

14

Fill in the Blanks

15

Fill in the Blanks

16

media

17

media

18

media

19

media

20

media

21

media

22

media

23

Multiple Choice

What element of your risk mitigation strategy helps keep future additions to your network from introducing new security vulnerabilities?
1
Change management
2
Incident management
3
Security audits
4
Technical controls

24

media

25

media

26

media

27

media

28

media

29

media

30

media

31

media

32

media

33

Multiple Choice

The process of eliminating a risk by choosing not to participate in an action or activity describes which of the following?

1

Risk avoidance

2

Risk mitigate

3

Residual risk

4

Risk acceptance

34

Multiple Select

A security breach can have a negative long-term impact on an organization’s _______ that has taken years to build.

1

Reputation

2

Revenue

3

Competitiveness

4

Incompetence

35

media

36

media

37

Multiple Choice

A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?

1

PCI DSS

2

ISO 22301

3

ISO 27001

4

NIST CSF

38

Multiple Choice

Your company has long maintained an email server, but it’s insecure and unreliable. You’re considering just outsourcing email to an external company that provides secure cloud-based email services. What risk management strategy are you employing?
1
Risk acceptance
2
Risk avoidance
3
Risk mitigation
4
Risk transference

39

media

40

media

41

media

42

media

43

media

44

media

45

Multiple Select

What steps might be taken as part of a vulnerability scan?
1
Bypassing security controls
2
Exploiting vulnerabilities
3
Finding open ports
4
Identifying vulnerabilities
5
Passively testing security controls

46

Multiple Select

Which of the following RAID levels incorporates disk striping? Select all that apply
1
RAID 0
2
RAID 1
3
RAID 5
4
RAID 10

47

media

48

media

49

Fill in the Blanks

50

Drag and Drop

You overhear a conversation in which an employee might be disclosing confidential information to an external party.
Question: What should be evaluated to investigate any disclosing breach​
Drag these tiles and drop them in the correct blank above
Background Check
Onboarding
Mandatory Vacation Policy
Job Rotation Implementation
Non-Disclosure Agreement

51

Multiple Choice

What is the primary benefit of mandatory vacation in an organization?

1

To increase employee morale

2

To detect illegal activities like fraud

3

To reduce the workload of employees

4

To improve job rotation

52

Fill in the Blanks

Type answer...

53

Fill in the Blanks

Type answer...

54

Drag and Drop

Background checks are important to verify an applicant's ​
and to uncover any ​
history which may be harmful to the company.​
Drag these tiles and drop them in the correct blank above
employment
criminal
options
letters
clean desk
NDA

55

Fill in the Blanks

56

Fill in the Blanks

Type answer...

57

Fill in the Blanks

Type answer...

58

Fill in the Blanks

Type answer...

59

Multiple Choice

Job rotation involves rotating employees through various positions to prevent any single person from holding particular job responsibilities for an extended period.

1

True

2

False

60

Multiple Choice

An employee who never takes vacation is not considered a security risk.

1

True

2

False

61

Multiple Select

Which of the following are components of onboarding? (Select all that apply)

1

Background checks

2

Exit interviews

3

Initial training

4

Non-Disclosure Agreements (NDAs)

5

Mandatory Vacation

62

media
media

Show answer

Auto Play

Slide 1 / 62

SLIDE