Search Header Logo

The Cybersecurity Landscape

Authored by Neo 0101

Computers

Professional Development

Used 3+ times

The Cybersecurity Landscape
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A list of email addresses from customers of the Splunk T-Shirt company has been disclosed by accident. What are the most likely impacts of this incident? (Select 2)

  • The company will have to pay attorney's fees


  • Increased risk of Identity theft for individuals

  • Interruption of critical services


  • Damage to the company's reputation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action for Risk Identification in this scenario: An organization moves their data center to an area away from frequent natural disasters

Accept

Avoid

Mitigate

Transfer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action for Risk Identification in this scenario: An organization decides to use third-party cloud software instead of developing in-house

Avoid

Accept

Mitigate

Transfer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action for Risk Identification in this scenario: An organization installs Anti-Malware software on employee devices

Mitigate

Avoid

Acceptance

Transfer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action for Risk Identification in this scenario: An organization documents the risk of offering their services online

Avoid

Transfer

Accept

Mitigate

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the frameworks mentioned in this course represents a broad consensus about the most critical security risks to web applications?

OWASP Top 10

ISO/IEC 27000 series

CIS 18

NIST CSF

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Authorization mean?

No party can deny the validity of the data

Ensuring that protected information is only seen by those who are meant to see it

Being able to verify the identity of a user, process or device

Refers to the access that should be granted to a user, process or device

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?