Search Header Logo

ISC2 - CC - Chapter 1 - Module 2

Authored by Sebastian Zamorano

Computers

University

Used 57+ times

ISC2 - CC - Chapter 1 - Module 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is impact in risk management?

The probability of a risk occurring
The potential consequences or severity of a risk
The level of effort required for risk mitigation
The financial value associated with a risk event

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The magnitude of the harm expected as result of the consequences of unauthorized disclosure, modification, destruction, or loss of information, is known as?

Likelihood
Threat
Impact
Vulnerability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is likelihood in risk management?

The potential consequences or severity of a risk
The probability of a risk occurring
The level of effort required for risk mitigation
The financial value associated with a risk event

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is risk appetite in risk management?

The willingness to take risks
The complete avoidance of all risks
The process of transferring risks to external parties
The acceptance of all risks without any action

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are the main categories of risk?

Cyber attack risks and environmental risks
Cyber attack risks and threat risks
Vulnerability risks and environmental risks
Cyber attack risks and automatic risks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is risk management important in organizations?

It eliminates all risks completely
It ensures the confidentiality of sensitive information
It helps organizations make informed decisions to mitigate potential risks
It transfers all risks to external parties

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the followings is usually used to represent risk?

Threat actors and vulnerabilities
Assets, vulnerabilities, and threats
Likelihood and impact
Probability and cause

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers