Lesson 5.1 InfoSec Risk Management Basics

Lesson 5.1 InfoSec Risk Management Basics

Professional Development

•

28 Qs

quiz-placeholder

Similar activities

A+ - 18C - Troubleshoot Mobile OS and App Security

A+ - 18C - Troubleshoot Mobile OS and App Security

Professional Development

•

23 Qs

LIST-TUPLES-SET-DICTIONARY

LIST-TUPLES-SET-DICTIONARY

Professional Development

•

25 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

•

25 Qs

Quiz Test 01

Quiz Test 01

University - Professional Development

•

25 Qs

SEO Assessment Exam

SEO Assessment Exam

Professional Development

•

24 Qs

Level 1 Session 7 Recap simplified M.Walid&Omar

Level 1 Session 7 Recap simplified M.Walid&Omar

Professional Development

•

24 Qs

Mircrosoft Server Admin 98-365

Mircrosoft Server Admin 98-365

KG - Professional Development

•

24 Qs

netdocuments knowledge

netdocuments knowledge

Professional Development

•

23 Qs

Lesson 5.1 InfoSec Risk Management Basics

Lesson 5.1 InfoSec Risk Management Basics

Assessment

Quiz

•

Computers

•

Professional Development

•

Medium

Created by

Meg Perron

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is Information Security Risk Management?

The forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimize their impact.

It allows the organization to assess, identify, and modify its overall security posture.

It enables security, operations, organizational leadership, and other personnel to collaborate and view the entire organization from an attacker's perspective.

Both B and C

Controlling the likelihood and impact of bad things involving information.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a "threat"?

An unpatched system.

A person or thing likely to cause damage or danger.

A virus on a device.

A weakness that results in unwanted attacks.

Both A and B

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of incident is a misconfiguration?

A threat

A vulnerability

An exploit

Both B and C

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is type of incident is phishing?

A threat

A vulnerability

An exploit

A recreational activity

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a vulnerability?

The quality of being vulnerable.

The quality of state of being exposed to the possibility of being attacked or harmed, physically or emotionally

A weakness or gap in control.

All of the above.

6.

OPEN ENDED QUESTION

45 sec • Ungraded

Explain Risk.

Evaluate responses using AI:

OFF

Answer explanation

The likelihood that a threat will exploit a vulnerability.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

True or false. If there isn't a vulnerability, there isn't a risk.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?