Chapter 15 Risk Quiz

Chapter 15 Risk Quiz

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Security Risk Management

Security Risk Management

11th Grade - Professional Development

10 Qs

Balance Sheet

Balance Sheet

11th Grade

10 Qs

TC2--MSU Adulting: Investing and Risk Quiz

TC2--MSU Adulting: Investing and Risk Quiz

9th - 12th Grade

10 Qs

Risk Assessments

Risk Assessments

3rd Grade - University

10 Qs

Introduction to Investments

Introduction to Investments

1st - 10th Grade

11 Qs

Basic Concept of Hazard and Disaster

Basic Concept of Hazard and Disaster

11th - 12th Grade

10 Qs

Rules of debit and credit- 2

Rules of debit and credit- 2

11th Grade

11 Qs

Depreciation- straight line method 2

Depreciation- straight line method 2

11th Grade

8 Qs

Chapter 15 Risk Quiz

Chapter 15 Risk Quiz

Assessment

Quiz

9th - 12th Grade

Medium

Created by

Walisa Sabb

Used 213+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat results from ______________.

lack of trained security staff

weak physical security

a vulnerability exploited from a threat agent

single factor authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to manage assets?

To know if any assets are missing or were stolen

To identify the vulnerabilities in the asset

To identify who is using an asset

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a low priority impact?

An electrical issue forced the shutdown of all redundant servers and equipment.

Someone hacked the Twitter account and tweeted nonsense tweets from the account.

A repeat customer cannot access his or her customer account.

A water pipe breaks, impacting computers and printers in the marketing department.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which best represents an intangible IT asset?

ID cards

laptops

Server room

Company's reputation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Continually scanning for malware is an example of risk ____________.

transfer

mitigation

elimination

management

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identifying the risks in a situation is called ______________.

risk awareness

risk monitoring

risk assessment

risk framing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If an IT staffer is determining potential losses with actual financial data, he/she is ______________________.

performing risk with monetary verification

conducting an overall risk assessment

using a quantitative risk assessment method

using a qualitative method of risk analysis

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a step in the NIST 800-39 risk-management framework document?

identify the risk

frame the risk

monitor the risk

assess the risk