Search Header Logo

IASDP

Authored by John Bernie Ruiz

Computers

University

Used 1+ times

IASDP
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of a risk assessment process?

To completely eliminate all security risks
To determine an appropriate security budget and implement optimal protection controls
To identify all potential threats to an organization
To punish employees who cause security breaches

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of information security, what defines a "threat severity"?

The number of potential threats
The magnitude of potential damage a threat event can impose on an organization
The technical complexity of a potential breach
The frequency of threat attempts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a "vulnerability" in information security?

An active attack on a system
A weakness that could be exploited by a threat source
The total cost of potential security breaches
The specific methods used by hackers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Data Privacy Act of 2012, companies are required to register with the National Privacy Commission if they:

Have more than 100 employees
Process any type of personal information
Have at least 250 employees or access to personal information of 1,000 people
Are located in major urban areas

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key difference between a data controller and a data processor?

Data controllers are always government agencies
Data processors handle more sensitive information
Data controllers determine the purposes and procedures of data usage, while processors simply process data
There is no significant difference between the two

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In privacy impact assessment, "prejudicial potential" refers to:

The legal risks of data collection
An estimation of potential damage from threat consequences
The likelihood of a data breach
The cost of implementing privacy controls

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What constitutes "consent" under the Data Privacy Law?

Implied agreement through continued use of a service
A freely given, specific, informed indication of will to collect or process personal data
Written permission from a company's legal department
Verbal agreement with a customer service representative

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?