Information Security Management Quiz

Information Security Management Quiz

University

15 Qs

quiz-placeholder

Similar activities

Cyber EOP - Security Policies By Mr. B

Cyber EOP - Security Policies By Mr. B

12th Grade - University

18 Qs

Understanding ISMS Principles Quiz

Understanding ISMS Principles Quiz

University

10 Qs

PRELIM-ITON-S1

PRELIM-ITON-S1

University

10 Qs

Topic 4 - Understanding System Vulnerabilities

Topic 4 - Understanding System Vulnerabilities

12th Grade - University

15 Qs

Mastering Physical Security Concepts

Mastering Physical Security Concepts

12th Grade - University

15 Qs

Software Architecture and Testing

Software Architecture and Testing

University

15 Qs

MIT&ISS - Week 6 - Recap

MIT&ISS - Week 6 - Recap

University

15 Qs

PRELIM Review - ITON

PRELIM Review - ITON

University

18 Qs

Information Security Management Quiz

Information Security Management Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Roshan Jameel

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does ISMS stand for?

Information Security Management Strategy

Information Security Management System

Information System Management Security

Information Security Monitoring System

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a key component of ISMS?

Marketing Strategies

Policies

Procedures

Documentation

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the primary objective of ISMS?

Maximize profits

Ensure confidentiality, integrity, and availability of information

Increase employee productivity

Enhance customer service

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the principle of Least Privilege entail?

Limiting access rights to the minimum necessary

Sharing passwords among employees

Providing maximum access rights to all users

Allowing unrestricted access to sensitive information

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an example of an internal risk?

Regulatory changes

Cyber-attacks

Supply chain vulnerabilities

Employee errors

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the first step in the risk assessment process?

Mitigate Risks

Evaluate Risks

Assess Risks

Identify Risks

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which risk mitigation strategy involves shifting the risk to a third party?

Mitigate

Transfer

Accept

Avoid

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?