Security assurance

Security assurance

Professional Development

6 Qs

quiz-placeholder

Similar activities

Element's New Values and Purpose

Element's New Values and Purpose

Professional Development

10 Qs

TYPES OF RISK

TYPES OF RISK

Professional Development

11 Qs

Operational Risk Quiz for GAP Feb2022

Operational Risk Quiz for GAP Feb2022

Professional Development

10 Qs

ORM Framework & Tools (Refreshment)

ORM Framework & Tools (Refreshment)

Professional Development

10 Qs

ENNOVATION SUMIT

ENNOVATION SUMIT

Professional Development

7 Qs

Autism

Autism

Professional Development

10 Qs

Lean

Lean

Professional Development

7 Qs

Security assurance

Security assurance

Assessment

Quiz

Other

Professional Development

Hard

Created by

Akash Goel

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the one is not an assurance component as per CESG?
Implementation assurance
Intrinsic Assurance
Internal Assurance
None

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which assurance component involves assurance justification?
Implementation assurance
Operational Assurance
Intrinsic Assurance
Extrinsic Assurance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a testing where the tester knows very little about the business, what information they infrastructure has been configured. Which tetsing is this?
GreyBox Testing
Blackbox Testing
Whitebox testing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security Testing is an automated review against known vulnerabilities to identify security flaws, bugs in the code, default credentials, and whether any loopholes (or back doors) can be used to access information without authorization
True
False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Supply chain assurance will come under:
Implementation assurance
Operational Assurance
Intrinsic Assurance
Extrinsic Assurance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ultimate aim of security assurance is:
To counter cyber fraud
To gain insight into the degree to which implementd and operational system meets its security requirements
To develop a security policy
To Eliminate risk of security breach