Search Header Logo

Quiz 2 - PROFE5 313 - BSIS 3A

Authored by Ryan Gente

Professional Development

University

Used 13+ times

Quiz 2 - PROFE5 313 - BSIS 3A
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the first step in the Risk Management Process?

Risk Assessment
Risk Evaluation
Risk Identification
Risk Treatment
Monitoring and Review

Answer explanation

Risk Identification is the process of recognizing potential threats to information security.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT considered an information asset?

Data
Hardware
Employees
Risk
Processes

Answer explanation

Risk is a concept in security management but not an asset that requires protection.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of Risk Evaluation?

To classify risks
To identify risks
To treat risks
To accept risks
To remove all risks

Answer explanation

Risk evaluation helps determine which risks need immediate action based on their level.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is a common security risk?

Malware
Encryption
Data Backup
Multi-Factor Authentication
Firewall

Answer explanation

Malware is a type of cyberattack that can compromise security.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which risk treatment strategy involves accepting the risk as it is?

Risk Avoidance
Risk Reduction
Risk Transfer
Risk Acceptance
Risk Monitoring

Answer explanation

Risk Acceptance means choosing to accept a risk if it falls within acceptable levels.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an example of a physical security threat?

Phishing
Data Encryption
Firewall Misconfiguration
Theft
Weak Passwords

Answer explanation

Theft is a physical threat that could lead to unauthorized access to information.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does risk reduction aim to achieve?

Eliminate risk completely
Minimize the impact of risk
Transfer risk to another party
Ignore risk
Evaluate risk

Answer explanation

Risk reduction involves implementing security controls to minimize risk.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?