PRELIM-ITON-S1

PRELIM-ITON-S1

University

10 Qs

quiz-placeholder

Similar activities

SMITE 6.0: Get to Know Cybersecurity

SMITE 6.0: Get to Know Cybersecurity

University

11 Qs

Graphs

Graphs

University

15 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

tik kelas 7

tik kelas 7

1st Grade - University

15 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

Jaringan Dasar

Jaringan Dasar

University

10 Qs

BIM1014 Quiz 2

BIM1014 Quiz 2

KG - University

15 Qs

Computer Network Fun Review 5 - Data Link Layer

Computer Network Fun Review 5 - Data Link Layer

University

10 Qs

PRELIM-ITON-S1

PRELIM-ITON-S1

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Mary Jane Somao-i

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of an Information Security Management System (ISMS)?

Employee training

Risk assessment and management

Data storage solutions

Cost reduction

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a component of the CIA triad?

Transparency

Accessibility

Integrity

Simplicity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'Plan' phase in the Plan-Do-Check-Act (PDCA) model involve?

Implementing security policies

Monitoring effectiveness

Identifying problems and collecting information

Documenting results

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which ISO standard provides requirements for an ISMS?

ISO 9001

ISO 45001

ISO 14001

ISO/IEC 27001

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of risk assessment uses monetary amounts to measure risk?

Quantitative risk assessment

Behavioral risk assessment

Operational risk assessment

Qualitative risk assessment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of data and information protection?

Confidentiality

Integrity

Availability

Scalability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a risk assessment matrix?

To train employees on security measures

To implement security policies

To monitor network traffic

To categorize risks based on their level of probability and severity

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?