
Intro to Cybersecurity Quiz 2 practice
Authored by Indira Dutta
Computers
University
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Risk control, also known as risk treatment, is the application of controls that reduce the risks to an organization’s information assets to an acceptable level.
True
False
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Residual risk is the risk that organizations are willing to accept even after current controls have been applied.
True
False
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You cannot use qualitative measures to rank information asset values.
True
False
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The _____ risk treatment strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.
defense
transference
mitigation
acceptance
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The _____ risk treatment strategy attempts to shift risk to other assets, other processes, or other organizations.
transference
defense
acceptance
mitigation
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
_____ equals the probability of a successful attack multiplied by the expected loss from a successful attack plus an element of uncertainty.
Loss magnitude
Risk
Loss frequency
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The probability that a specific vulnerability within an organization will be attacked by a threat is known as _____
determinism
likelihood
externality
potential
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?