Intro to Cybersecurity Quiz 2 practice

Intro to Cybersecurity Quiz 2 practice

University

30 Qs

quiz-placeholder

Similar activities

Midterm Exam

Midterm Exam

University

25 Qs

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

MIS(BSBA) MIDTERM

MIS(BSBA) MIDTERM

University

25 Qs

Ecommerce Quiz

Ecommerce Quiz

University

25 Qs

Informática 1 y 2

Informática 1 y 2

University

25 Qs

Pemrograman Dasar untuk SMK/SMA/MA

Pemrograman Dasar untuk SMK/SMA/MA

University

25 Qs

Macromedia Flash

Macromedia Flash

8th Grade - Professional Development

26 Qs

UH-3 DASAR DESAIN GRAFIS

UH-3 DASAR DESAIN GRAFIS

1st Grade - University

25 Qs

Intro to Cybersecurity Quiz 2 practice

Intro to Cybersecurity Quiz 2 practice

Assessment

Quiz

Computers

University

Medium

Created by

Indira Dutta

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Risk control, also known as risk treatment, is the application of controls that reduce the risks to an organization’s information assets to an acceptable level.

True

False

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Residual risk is the risk that organizations are willing to accept even after current controls have been applied.

True

False

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You cannot use qualitative measures to rank information asset values.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The _____ risk treatment strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.

defense

transference

mitigation

acceptance

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The _____ risk treatment strategy attempts to shift risk to other assets, other processes, or other organizations.

transference

defense

acceptance

mitigation

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

_____ equals the probability of a successful attack multiplied by the expected loss from a successful attack plus an element of uncertainty.

Loss magnitude

Risk

Loss frequency

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The probability that a specific vulnerability within an organization will be attacked by a threat is known as _____

determinism

likelihood

externality

potential

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers