Search Header Logo

Test blanc

Authored by Abdelghafour Ajoua

Computers

University

Used 10+ times

Test blanc
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cybersecurity activities should be coordinated by:

Representatives from different parts of the organization with relevant roles and job functions

The chief information security officer

The cybersecurity program manager

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

“Level of risk” is defined with the following statement

Magnitude of a risk expressed in terms of the potential vulnerabilities and the threats that they possess

List of risks with value levels assigned

Magnitude of a risk expressed in terms of the combination of consequences and their likelihood

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The risk that remains after the implementation of controls aiming to reduce the inherent risk is defined as

Treated risk

Residual risk

Avoided risk

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Monitoring systems which do not respond to anything against incoming packets found within the Darknet IP domains refers to

Black hole monitoring

White hole monitoring

Gray hole monitoring

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Please determine the correct definition of threats in the cyberspace

Potential cause of an unwanted incident, which may result in harm to a system, individual or organization

Weakness of an asset or control that can be exploited

Effect of uncertainty on objectives

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The expression of the intent of the organization to treat the risks identified and/or to comply with requirements of organizational security is the objective of

Cybersecurity program

Information security program

Cyberspace program

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the risk treatment options the organization is adopting, in the scenario when it has recently conducted a risk assessment of their IT systems and decided to cancel the e-commerce activity to eliminate the risk of an accidental phishing threat?

Risk Modification

Risk Elimination

Risk Avoidance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers