uCertify 34-35

uCertify 34-35

University

14 Qs

quiz-placeholder

Similar activities

Computer components

Computer components

1st Grade - University

10 Qs

Intro to Data Mining

Intro to Data Mining

University

16 Qs

Computer Security Measure

Computer Security Measure

11th Grade - University

19 Qs

Week 8 UOL

Week 8 UOL

University

10 Qs

Exception handling -oracle plsql

Exception handling -oracle plsql

University

15 Qs

UTS Pengantar Keamanan Siber dan S_Informasi

UTS Pengantar Keamanan Siber dan S_Informasi

University

10 Qs

Storage Concepts, Chapter 5 & Office 2016 Pop Quiz

Storage Concepts, Chapter 5 & Office 2016 Pop Quiz

University

10 Qs

Y8 network hardware

Y8 network hardware

7th Grade - University

15 Qs

uCertify 34-35

uCertify 34-35

Assessment

Quiz

Computers

University

Hard

Created by

Victoria Ferrell

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following usually entails not carrying out a proposed plan because the risk factor is too great?

Risk mitigation

Risk assessment

Risk transference

Risk avoidance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which process is required by GDPR to identify the risk of data compromise to an individual?

data control

impact assessment

terms of agreement

all of these

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of disaster can be defined as being caused by the influence of individuals?

person-made

environmental

weather-made

none of these

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the attempt to determine the number of threats or hazards that could possibly occur in a given amount of time to your computers and networks?

Risk avoidance

Risk assessment

Risk mitigation

Risk acceptance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ defines the average number of failures per million hours of operation for a product in question?

MTBF

None of these

MTBR

MTTR

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of risk transference?

All of these

Risk appetite

Risk avoidance

Cybersecurity insurance

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has just hired a new employee. However, the employee is really a spy looking to steal your intellectual property. Which type of risk would this be considered?

Multiparty

All of these

External

Internal

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?