ISO 27001 PRACTITIONER EN D1 - EX 1

ISO 27001 PRACTITIONER EN D1 - EX 1

Professional Development

5 Qs

quiz-placeholder

Similar activities

ENERGIZER ENPRO 4.0 MP

ENERGIZER ENPRO 4.0 MP

Professional Development

10 Qs

Oper - What do you know about mortgages?

Oper - What do you know about mortgages?

KG - Professional Development

10 Qs

FSO COI Quiz

FSO COI Quiz

Professional Development

10 Qs

Eldora Quiz Minigame

Eldora Quiz Minigame

Professional Development

10 Qs

ITIL 4 Foundation Practice (4)

ITIL 4 Foundation Practice (4)

Professional Development

10 Qs

Security Risk Management

Security Risk Management

11th Grade - Professional Development

10 Qs

Day 1 Recap Quiz

Day 1 Recap Quiz

Professional Development

7 Qs

introduction to financial reporting

introduction to financial reporting

Professional Development

10 Qs

ISO 27001 PRACTITIONER EN D1 - EX 1

ISO 27001 PRACTITIONER EN D1 - EX 1

Assessment

Quiz

Other

Professional Development

Medium

Used 8+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The statement "risk = value X vulnerability X threat" indicates that:

A. Risk can be quantified using annual loss expectancy (ALE).

B. The level of risk is greater where the asset value is highest.

C. Risk is derived from one or all of its subcomponents.

D. Without knowing value, risk cannot be calculated.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A risk analysis should:

A. Limits the scope to a benchmark of similar companies.

B. Assume an equal degree of protection for all assets.

C. Address the potential impacts and likelihood of loss.

D. Give more weight to the likelihood vs. the size of the loss.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Residual risk can be determined by:

A. Assessing risk after security controls are in place.

B. Performing a threat analysis.

C. Identification of new risk scenarios after treatment of risk

D. Carrying out a risk transfer

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following factors BEST helps determine the appropriate protection level for an information asset?

A. The cost of acquisition and implementation of the asset.

B. Knowledge of vulnerabilities present in the asset.

C. The degree of exposure to known threats.

D. The criticality of the business process supported by the asset.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are the MOST important considerations when prioritizing the implementation of security controls to treat

the risks?

A. Likelihood and impact.

B. Impact and exposure.

C. Asset criticality and sensitivity.

D. Asset value and classification.