
The Cybersecurity Landscape
Authored by Neo 0101
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A list of email addresses from customers of the Splunk T-Shirt company has been disclosed by accident. What are the most likely impacts of this incident? (Select 2)
The company will have to pay attorney's fees
Increased risk of Identity theft for individuals
Interruption of critical services
Damage to the company's reputation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best course of action for Risk Identification in this scenario: An organization moves their data center to an area away from frequent natural disasters
Accept
Avoid
Mitigate
Transfer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best course of action for Risk Identification in this scenario: An organization decides to use third-party cloud software instead of developing in-house
Avoid
Accept
Mitigate
Transfer
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best course of action for Risk Identification in this scenario: An organization installs Anti-Malware software on employee devices
Mitigate
Avoid
Acceptance
Transfer
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best course of action for Risk Identification in this scenario: An organization documents the risk of offering their services online
Avoid
Transfer
Accept
Mitigate
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the frameworks mentioned in this course represents a broad consensus about the most critical security risks to web applications?
OWASP Top 10
ISO/IEC 27000 series
CIS 18
NIST CSF
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Authorization mean?
No party can deny the validity of the data
Ensuring that protected information is only seen by those who are meant to see it
Being able to verify the identity of a user, process or device
Refers to the access that should be granted to a user, process or device
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
China: Communism
Quiz
•
Professional Development
15 questions
Unit 1 lesson 1
Quiz
•
University - Professi...
20 questions
TUGAS 2 PROTOCOL DAN IP ADDRESS
Quiz
•
Professional Development
15 questions
Module 2A. Active Reconnaissance - Scanning
Quiz
•
Professional Development
15 questions
Computer basics for beginners
Quiz
•
Professional Development
15 questions
Sec+ CH.2 Review Test
Quiz
•
Professional Development
13 questions
Guess the Retro Computer 1
Quiz
•
KG - Professional Dev...
15 questions
Latihan TIK
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development