CH 4 - PLANNING FOR SECURITY

CH 4 - PLANNING FOR SECURITY

University

10 Qs

quiz-placeholder

Similar activities

Digital Etiquette

Digital Etiquette

4th Grade - University

15 Qs

Unit 28 - Quiz #1

Unit 28 - Quiz #1

University

15 Qs

PROBLEM SOLVING USING R  UNIT I  MCQS

PROBLEM SOLVING USING R UNIT I MCQS

University

15 Qs

UAS Audit Sistem Informasi

UAS Audit Sistem Informasi

University

10 Qs

Storage Quiz Challenge

Storage Quiz Challenge

University

10 Qs

Day #03  | Quiz

Day #03 | Quiz

University

11 Qs

Bangkit CC-46 Quiz

Bangkit CC-46 Quiz

University

11 Qs

The AI Shield

The AI Shield

University

15 Qs

CH 4 - PLANNING FOR SECURITY

CH 4 - PLANNING FOR SECURITY

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

N M

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is important to consider short-term and long-term

objectives to develop a comprehensive and effective

information security program.

TRUE

FALSE

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Thoroughly understand your organization’s ______________ are the insights to determine info security program objectives.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Patch management and vulnerability remediation is essential for addressing_______.

increasing risk

ignore vulnerabilities

known vulnerabilities and reducing the risk

cause potential damage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A well defined policy serves as cornerstone of an info security program, outlining the rules and regulations.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

THREE categories of security controls are operational, technical and _________ controls

strategic

management

risk

threat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Key services in info security services are followings EXCEPT __________.

Vulnerability management service

Malware detection services

Log monitoring services

Military services

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

DiD stands for _________, to safeguard sensitive info.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?