Quiz 2 - PROFE5 313 - BSIS 3A

Quiz 2 - PROFE5 313 - BSIS 3A

University

30 Qs

quiz-placeholder

Similar activities

Class Test

Class Test

University

30 Qs

Session IAP 9

Session IAP 9

University

25 Qs

Project+: Review for Quiz 2

Project+: Review for Quiz 2

University - Professional Development

26 Qs

ISPRMT - Final Quiz 1

ISPRMT - Final Quiz 1

University

30 Qs

Entrepreneurship Quizzz

Entrepreneurship Quizzz

University

25 Qs

Patient Safety and Reporting in Canada

Patient Safety and Reporting in Canada

University

25 Qs

All about Entrepreneurship

All about Entrepreneurship

11th Grade - University

30 Qs

Cyber Security Quiz 1

Cyber Security Quiz 1

University

30 Qs

Quiz 2 - PROFE5 313 - BSIS 3A

Quiz 2 - PROFE5 313 - BSIS 3A

Assessment

Quiz

Professional Development

University

Easy

Created by

Ryan Gente

Used 13+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the first step in the Risk Management Process?
Risk Assessment
Risk Evaluation
Risk Identification
Risk Treatment
Monitoring and Review

Answer explanation

Risk Identification is the process of recognizing potential threats to information security.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT considered an information asset?
Data
Hardware
Employees
Risk
Processes

Answer explanation

Risk is a concept in security management but not an asset that requires protection.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of Risk Evaluation?
To classify risks
To identify risks
To treat risks
To accept risks
To remove all risks

Answer explanation

Risk evaluation helps determine which risks need immediate action based on their level.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is a common security risk?
Malware
Encryption
Data Backup
Multi-Factor Authentication
Firewall

Answer explanation

Malware is a type of cyberattack that can compromise security.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which risk treatment strategy involves accepting the risk as it is?
Risk Avoidance
Risk Reduction
Risk Transfer
Risk Acceptance
Risk Monitoring

Answer explanation

Risk Acceptance means choosing to accept a risk if it falls within acceptable levels.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an example of a physical security threat?
Phishing
Data Encryption
Firewall Misconfiguration
Theft
Weak Passwords

Answer explanation

Theft is a physical threat that could lead to unauthorized access to information.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does risk reduction aim to achieve?
Eliminate risk completely
Minimize the impact of risk
Transfer risk to another party
Ignore risk
Evaluate risk

Answer explanation

Risk reduction involves implementing security controls to minimize risk.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?