Intro to Cybersecurity Quiz 2 practice

Intro to Cybersecurity Quiz 2 practice

University

30 Qs

quiz-placeholder

Similar activities

Java Review

Java Review

9th Grade - University

25 Qs

Rekayasa Perangkat Lunak

Rekayasa Perangkat Lunak

University

25 Qs

Round -1

Round -1

University

25 Qs

VOCABULARY - CHECK

VOCABULARY - CHECK

University

25 Qs

MSW Logo Quiz (Grade IV)

MSW Logo Quiz (Grade IV)

4th Grade - University

25 Qs

Interkasi Manusia Komputer

Interkasi Manusia Komputer

University

25 Qs

JOA-IT HPSSB Practice set-1

JOA-IT HPSSB Practice set-1

11th Grade - University

25 Qs

Test quiz

Test quiz

University

25 Qs

Intro to Cybersecurity Quiz 2 practice

Intro to Cybersecurity Quiz 2 practice

Assessment

Quiz

Computers

University

Medium

Created by

Indira Dutta

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Risk control, also known as risk treatment, is the application of controls that reduce the risks to an organization’s information assets to an acceptable level.

True

False

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Residual risk is the risk that organizations are willing to accept even after current controls have been applied.

True

False

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You cannot use qualitative measures to rank information asset values.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The _____ risk treatment strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.

defense

transference

mitigation

acceptance

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The _____ risk treatment strategy attempts to shift risk to other assets, other processes, or other organizations.

transference

defense

acceptance

mitigation

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

_____ equals the probability of a successful attack multiplied by the expected loss from a successful attack plus an element of uncertainty.

Loss magnitude

Risk

Loss frequency

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The probability that a specific vulnerability within an organization will be attacked by a threat is known as _____

determinism

likelihood

externality

potential

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?