
ITRM&DR QUIZ
Authored by _calonprofesor_ _calonprofesor_
Computers, Science
1st - 5th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Integrity ensures that only those with rights and privileges to access the information are able to do so
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Threat is talking about a category of objects, persons, or other entities that pose a potential risk of loss to an asset
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Vulnerability is a weakness or fault in the protection mechanisms for information assets
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A process of examining and documenting the security posture of an organization’s information technology
Risk control
Risk implementation
Risk execution
Risk evaluation
Risk identification
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
It is not a part of malware attack goals
Destroy data
Manipulate information
Corrupt data
Shutdown the system
Spread the virus, worms, and trojan
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
New viruses, worms, Trojan programs appear every time
True
False
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
The following are not types of assessments that might be preformed to test security controls:
Corporate engineering
Document review
Policy assessment
Security design review
Risk management planning
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?