Lesson 5.1 InfoSec Risk Management Basics

Lesson 5.1 InfoSec Risk Management Basics

Professional Development

•

28 Qs

quiz-placeholder

Similar activities

NestJS + SQL - Parte 02

NestJS + SQL - Parte 02

Professional Development

•

23 Qs

ICEBERG_Assessment_Pre

ICEBERG_Assessment_Pre

University - Professional Development

•

23 Qs

Python: Quiz 2.03 - Basic Data Types

Python: Quiz 2.03 - Basic Data Types

Professional Development

•

25 Qs

Java AWT Swings Quiz 1

Java AWT Swings Quiz 1

Professional Development

•

24 Qs

Integrating AI tools in Excel

Integrating AI tools in Excel

Professional Development

•

24 Qs

#01.01 Foundations of Cybersecurity Module 1

#01.01 Foundations of Cybersecurity Module 1

Professional Development

•

24 Qs

Android

Android

5th Grade - Professional Development

•

24 Qs

Ethereum Devcon Quiz - 1

Ethereum Devcon Quiz - 1

Professional Development

•

25 Qs

Lesson 5.1 InfoSec Risk Management Basics

Lesson 5.1 InfoSec Risk Management Basics

Assessment

Quiz

•

Computers

•

Professional Development

•

Medium

Created by

Meg Perron

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is Information Security Risk Management?

The forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimize their impact.

It allows the organization to assess, identify, and modify its overall security posture.

It enables security, operations, organizational leadership, and other personnel to collaborate and view the entire organization from an attacker's perspective.

Both B and C

Controlling the likelihood and impact of bad things involving information.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a "threat"?

An unpatched system.

A person or thing likely to cause damage or danger.

A virus on a device.

A weakness that results in unwanted attacks.

Both A and B

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of incident is a misconfiguration?

A threat

A vulnerability

An exploit

Both B and C

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is type of incident is phishing?

A threat

A vulnerability

An exploit

A recreational activity

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a vulnerability?

The quality of being vulnerable.

The quality of state of being exposed to the possibility of being attacked or harmed, physically or emotionally

A weakness or gap in control.

All of the above.

6.

OPEN ENDED QUESTION

45 sec • Ungraded

Explain Risk.

Evaluate responses using AI:

OFF

Answer explanation

The likelihood that a threat will exploit a vulnerability.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

True or false. If there isn't a vulnerability, there isn't a risk.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?