Search Header Logo

ITRM&DR QUIZ

Authored by _calonprofesor_ _calonprofesor_

Computers, Science

1st - 5th Grade

Used 5+ times

ITRM&DR QUIZ
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Integrity ensures that only those with rights and privileges to access the information are able to do so

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Threat is talking about a category of objects, persons, or other entities that pose a potential risk of loss to an asset

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vulnerability is a weakness or fault in the protection mechanisms for information assets

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A process of examining and documenting the security posture of an organization’s information technology

Risk control

Risk implementation

Risk execution

Risk evaluation

Risk identification

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It is not a part of malware attack goals

Destroy data

Manipulate information

Corrupt data

Shutdown the system

Spread the virus, worms, and trojan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

New viruses, worms, Trojan programs appear every time

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The following are not types of assessments that might be preformed to test security controls:

Corporate engineering

Document review

Policy assessment

Security design review

Risk management planning

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?