Security Policies and Risk

Security Policies and Risk

University

5 Qs

quiz-placeholder

Similar activities

ch3-Ethics-20212-sec1

ch3-Ethics-20212-sec1

University

6 Qs

IS development(chapter3)

IS development(chapter3)

University

10 Qs

Computer Technology

Computer Technology

University

10 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

CH07.Managing Project Risk

CH07.Managing Project Risk

University

6 Qs

Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security

Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security

University

10 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

Cloud Computing

Cloud Computing

University

10 Qs

Security Policies and Risk

Security Policies and Risk

Assessment

Quiz

Computers

University

Medium

Created by

Mohd Hanis

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is not a common type of security policy?

Access control policy

Password policy

Risk management policy

Network topology policy

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main purpose of a risk assessment?

To identify and prioritize potential security risks

To implement security controls and policies

To train employees on security best practices

To monitor and respond to security incidents

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT an example of a security risk?

Unauthorized access to sensitive data

Physical theft of company assets

Software bugs and glitches

Regular system backups

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a common type of security control?

Firewall

Intrusion detection system

Data backup system

Employee performance review system

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common method for mitigating security risks?

Ignoring the risks and hoping for the best

Removing all potential vulnerabilities from a system

Accepting the risks and doing nothing to address them

Implementing security controls and policies