IASDP

IASDP

University

50 Qs

quiz-placeholder

Similar activities

Pagtatapos Isa

Pagtatapos Isa

University

45 Qs

NET1L - Lesson 3 (Protocols - Protocol Suites)

NET1L - Lesson 3 (Protocols - Protocol Suites)

University

45 Qs

Authentication/Access Control/Enterprise Architecture

Authentication/Access Control/Enterprise Architecture

9th Grade - University

50 Qs

Lesson 1 - Quiz

Lesson 1 - Quiz

University

50 Qs

Introduction to Data Communication 2

Introduction to Data Communication 2

University

50 Qs

#5 CIW Data Analyst - Certification Prep

#5 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

Hacker Types and Their Motivations

Hacker Types and Their Motivations

University

50 Qs

Networking

Networking

University

50 Qs

IASDP

IASDP

Assessment

Quiz

Computers

University

Medium

Created by

John Bernie Ruiz

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of a risk assessment process?
To completely eliminate all security risks
To determine an appropriate security budget and implement optimal protection controls
To identify all potential threats to an organization
To punish employees who cause security breaches

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of information security, what defines a "threat severity"?
The number of potential threats
The magnitude of potential damage a threat event can impose on an organization
The technical complexity of a potential breach
The frequency of threat attempts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a "vulnerability" in information security?
An active attack on a system
A weakness that could be exploited by a threat source
The total cost of potential security breaches
The specific methods used by hackers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Data Privacy Act of 2012, companies are required to register with the National Privacy Commission if they:
Have more than 100 employees
Process any type of personal information
Have at least 250 employees or access to personal information of 1,000 people
Are located in major urban areas

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key difference between a data controller and a data processor?
Data controllers are always government agencies
Data processors handle more sensitive information
Data controllers determine the purposes and procedures of data usage, while processors simply process data
There is no significant difference between the two

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In privacy impact assessment, "prejudicial potential" refers to:
The legal risks of data collection
An estimation of potential damage from threat consequences
The likelihood of a data breach
The cost of implementing privacy controls

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What constitutes "consent" under the Data Privacy Law?
Implied agreement through continued use of a service
A freely given, specific, informed indication of will to collect or process personal data
Written permission from a company's legal department
Verbal agreement with a customer service representative

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?