Search Header Logo

Security Policies and Risk

Authored by Mohd Hanis

Computers

University

Used 1+ times

Security Policies and Risk
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is not a common type of security policy?

Access control policy

Password policy

Risk management policy

Network topology policy

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main purpose of a risk assessment?

To identify and prioritize potential security risks

To implement security controls and policies

To train employees on security best practices

To monitor and respond to security incidents

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT an example of a security risk?

Unauthorized access to sensitive data

Physical theft of company assets

Software bugs and glitches

Regular system backups

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a common type of security control?

Firewall

Intrusion detection system

Data backup system

Employee performance review system

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common method for mitigating security risks?

Ignoring the risks and hoping for the best

Removing all potential vulnerabilities from a system

Accepting the risks and doing nothing to address them

Implementing security controls and policies

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?