uCertify 34-35

uCertify 34-35

University

14 Qs

quiz-placeholder

Similar activities

tik kelas 7

tik kelas 7

1st Grade - University

15 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

Jaringan Dasar

Jaringan Dasar

University

10 Qs

SQL Quiz

SQL Quiz

University

18 Qs

Chapter 3 Exploring Linux Filesystems

Chapter 3 Exploring Linux Filesystems

11th Grade - University

10 Qs

Adobe Photoshop

Adobe Photoshop

University

10 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

Memory-Mobo-Hard/Software

Memory-Mobo-Hard/Software

University

18 Qs

uCertify 34-35

uCertify 34-35

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Victoria Ferrell

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following usually entails not carrying out a proposed plan because the risk factor is too great?

Risk mitigation

Risk assessment

Risk transference

Risk avoidance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which process is required by GDPR to identify the risk of data compromise to an individual?

data control

impact assessment

terms of agreement

all of these

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of disaster can be defined as being caused by the influence of individuals?

person-made

environmental

weather-made

none of these

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the attempt to determine the number of threats or hazards that could possibly occur in a given amount of time to your computers and networks?

Risk avoidance

Risk assessment

Risk mitigation

Risk acceptance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ defines the average number of failures per million hours of operation for a product in question?

MTBF

None of these

MTBR

MTTR

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of risk transference?

All of these

Risk appetite

Risk avoidance

Cybersecurity insurance

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has just hired a new employee. However, the employee is really a spy looking to steal your intellectual property. Which type of risk would this be considered?

Multiparty

All of these

External

Internal

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers