Test blanc

Test blanc

University

20 Qs

quiz-placeholder

Similar activities

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

Python Quiz For Starters

Python Quiz For Starters

3rd Grade - Professional Development

17 Qs

Multimedia Video & Animation

Multimedia Video & Animation

University

20 Qs

Django-quiz

Django-quiz

5th Grade - University

20 Qs

21CSC305P - Machnine Learning - Quiz

21CSC305P - Machnine Learning - Quiz

University

15 Qs

MIDTERM EXAM - IT APP

MIDTERM EXAM - IT APP

University

17 Qs

Evaluasi Pertemuan 12 DRPL TI-3B

Evaluasi Pertemuan 12 DRPL TI-3B

University

15 Qs

Test blanc

Test blanc

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Abdelghafour Ajoua

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cybersecurity activities should be coordinated by:

Representatives from different parts of the organization with relevant roles and job functions

The chief information security officer

The cybersecurity program manager

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

“Level of risk” is defined with the following statement

Magnitude of a risk expressed in terms of the potential vulnerabilities and the threats that they possess

List of risks with value levels assigned

Magnitude of a risk expressed in terms of the combination of consequences and their likelihood

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The risk that remains after the implementation of controls aiming to reduce the inherent risk is defined as

Treated risk

Residual risk

Avoided risk

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Monitoring systems which do not respond to anything against incoming packets found within the Darknet IP domains refers to

Black hole monitoring

White hole monitoring

Gray hole monitoring

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Please determine the correct definition of threats in the cyberspace

Potential cause of an unwanted incident, which may result in harm to a system, individual or organization

Weakness of an asset or control that can be exploited

Effect of uncertainty on objectives

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The expression of the intent of the organization to treat the risks identified and/or to comply with requirements of organizational security is the objective of

Cybersecurity program

Information security program

Cyberspace program

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the risk treatment options the organization is adopting, in the scenario when it has recently conducted a risk assessment of their IT systems and decided to cancel the e-commerce activity to eliminate the risk of an accidental phishing threat?

Risk Modification

Risk Elimination

Risk Avoidance

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?