Test blanc

Test blanc

University

20 Qs

quiz-placeholder

Similar activities

Password Managers

Password Managers

University

20 Qs

Quiz on Errors and Failure in Computing

Quiz on Errors and Failure in Computing

University

16 Qs

Information Assurance and Security - Prelim Quiz

Information Assurance and Security - Prelim Quiz

University

25 Qs

Target

Target

University

16 Qs

First Quiz - CS326B

First Quiz - CS326B

University

15 Qs

First Quiz - CS326C

First Quiz - CS326C

University

15 Qs

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

Cyber EOP - Cybersecurity Lifecycle By Mr. B

Cyber EOP - Cybersecurity Lifecycle By Mr. B

12th Grade - University

20 Qs

Test blanc

Test blanc

Assessment

Quiz

Computers

University

Medium

Created by

Abdelghafour Ajoua

Used 10+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cybersecurity activities should be coordinated by:

Representatives from different parts of the organization with relevant roles and job functions

The chief information security officer

The cybersecurity program manager

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

“Level of risk” is defined with the following statement

Magnitude of a risk expressed in terms of the potential vulnerabilities and the threats that they possess

List of risks with value levels assigned

Magnitude of a risk expressed in terms of the combination of consequences and their likelihood

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The risk that remains after the implementation of controls aiming to reduce the inherent risk is defined as

Treated risk

Residual risk

Avoided risk

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Monitoring systems which do not respond to anything against incoming packets found within the Darknet IP domains refers to

Black hole monitoring

White hole monitoring

Gray hole monitoring

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Please determine the correct definition of threats in the cyberspace

Potential cause of an unwanted incident, which may result in harm to a system, individual or organization

Weakness of an asset or control that can be exploited

Effect of uncertainty on objectives

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The expression of the intent of the organization to treat the risks identified and/or to comply with requirements of organizational security is the objective of

Cybersecurity program

Information security program

Cyberspace program

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the risk treatment options the organization is adopting, in the scenario when it has recently conducted a risk assessment of their IT systems and decided to cancel the e-commerce activity to eliminate the risk of an accidental phishing threat?

Risk Modification

Risk Elimination

Risk Avoidance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?