Search Header Logo

DataPrivacy-reviewerprefi

Authored by Jessy Magno

Computers

University

DataPrivacy-reviewerprefi
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of a risk assessment process?

To eliminate all risks completely

To implement random security controls

To determine an appropriate budget for security and implement controls within that budget

To ensure legal compliance only

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a risk assessment estimate to meet its objectives?

The total cost of all assets

Potential cost of breaches and likelihood of breaches

Number of employees exposed to threats

Total number of threats in a system

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an asset in the context of risk assessment?

A security measure to prevent breaches

An item of value critical to achieving business objectives

A tool used to attack a system

A liability in the financial statement

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following defines a threat?

A vulnerability in a system

Any circumstance that could impact operations or assets adversely

A safeguard against risks

A type of attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term that refers to the measure of damage a threat can cause is called what?

Threat strength

Threat severity

Likelihood

Impact

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does threat strength refer to?

The probability of an event occurring

The force a threat agent can apply against an asset

The severity of damage caused by an event

The number of attacks in a year

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does threat event frequency indicate?

The likelihood of a threat agent acting within a given time frame

The duration of an attack

The amount of data stolen during an attack

The cost of a breach

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?