
The Cybersecurity Landscape
Authored by Neo 0101
Computers
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A list of email addresses from customers of the Splunk T-Shirt company has been disclosed by accident. What are the most likely impacts of this incident? (Select 2)
The company will have to pay attorney's fees
Increased risk of Identity theft for individuals
Interruption of critical services
Damage to the company's reputation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best course of action for Risk Identification in this scenario: An organization moves their data center to an area away from frequent natural disasters
Accept
Avoid
Mitigate
Transfer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best course of action for Risk Identification in this scenario: An organization decides to use third-party cloud software instead of developing in-house
Avoid
Accept
Mitigate
Transfer
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best course of action for Risk Identification in this scenario: An organization installs Anti-Malware software on employee devices
Mitigate
Avoid
Acceptance
Transfer
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best course of action for Risk Identification in this scenario: An organization documents the risk of offering their services online
Avoid
Transfer
Accept
Mitigate
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the frameworks mentioned in this course represents a broad consensus about the most critical security risks to web applications?
OWASP Top 10
ISO/IEC 27000 series
CIS 18
NIST CSF
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Authorization mean?
No party can deny the validity of the data
Ensuring that protected information is only seen by those who are meant to see it
Being able to verify the identity of a user, process or device
Refers to the access that should be granted to a user, process or device
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?