Tom is responsible for his company information security awareness program. He has concerns that the rapid change in technology may make the content outdated. What control can he put in place to protect against this risk?
CISSP DOMAIN 1 (Security and Risk Management)

Quiz
•
Professional Development
•
Professional Development
•
Medium
John Lee
Used 12+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Gamification
Computer based training
Content reviews
Live Training
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are writing a report to management on the results of a recent risk assessment you conducted. In your report you need to identify the remaining level of risk to the company after the adoption of security controls. What is the term used to describe the risk?
Inherent risk
Residual risk
Control risk
Mitigate risk
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Chan Brothers is an established travel agency in Singapore. They conduct regional tours. Since it is travel hub, many nationalities travel through Singapore and may take tours to the other destinations from it. They receive a request from one of their past EU customers to request for his account to be terminated. Under the General Data Protection Regulation (GDPR) there is a clause that states that individuals may request for their personal data to be no longer processed or disseminated. The clause is:
Right to access
Privacy by design
The right to be forgotten
The right of data portability
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sabrina conducted a risk assessment and commended to purchase cyber breach insurance. What type of risk response is that?
Accept
Transfer
Reduce
Reject
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Neal is speaking to his Board of Directors about their responsibility for reviewing the cybersecurity controls of the organization. What rule requires that senior executives take personal responsibility for information security matters?
Due diligence rule
Personal liability rule
Prudent man rule
Due process rule
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alex is a forensics investigator. While investigating a cyber security incident, he discovers that an attacker had used a normal user account but managed to exploit a vulnerability in one of the systems through providing that account with administrative rights. What type of attack took place under the STRIDE threat model?
Spoofing
Repudiation
Tampering
Elevation of privilege
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After completing a Business Continuity Planning you decided to accept one of the risks. What should you so next?
Implement new security controls to reduce the risk level
Design a disaster recovery plan
Repeat the business impact assessment
Document your decision making process
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Assessment for learning

Quiz
•
Professional Development
10 questions
Assessment for 21st Century Learners

Quiz
•
Professional Development
10 questions
RoadtoCertificate Week1

Quiz
•
Professional Development
10 questions
CGEIT Domain 4 (Additional MCQ)

Quiz
•
Professional Development
10 questions
STAAR Alternate 2 Assessments

Quiz
•
Professional Development
15 questions
Pre-Test BRAP NCR

Quiz
•
Professional Development
10 questions
PWAH - Perform Work at Height

Quiz
•
Professional Development
10 questions
Hazard Identification and Risk Assessment

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade