IT Security Risk Assessment ,ISO270001,ISO13335 Approaches

IT Security Risk Assessment ,ISO270001,ISO13335 Approaches

University

10 Qs

quiz-placeholder

Similar activities

CH 12- Defense in Depth

CH 12- Defense in Depth

University

10 Qs

Digital Security Risks and Ethics Quiz

Digital Security Risks and Ethics Quiz

University

14 Qs

Network Architecture

Network Architecture

University

14 Qs

CQB NTRMS 24

CQB NTRMS 24

University

15 Qs

FRE 101 | Cloud Storage and Securiy

FRE 101 | Cloud Storage and Securiy

University

15 Qs

IAS101 - Week 8

IAS101 - Week 8

University

15 Qs

Computer Security - IT Audit

Computer Security - IT Audit

University

15 Qs

Week #7 - Risk Management

Week #7 - Risk Management

University

12 Qs

IT Security Risk Assessment ,ISO270001,ISO13335 Approaches

IT Security Risk Assessment ,ISO270001,ISO13335 Approaches

Assessment

Quiz

Computers

University

Easy

Created by

Ritu Sharma

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the IT Security Management Process?

Implementing security controls

Performing a security risk assessment

Determining IT security objectives and policies

Writing security procedures

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key factor when selecting security controls for an organization?

Cost-effectiveness in protecting IT assets

The latest trends in cybersecurity

Randomly applying controls to see what works

Relying solely on antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it essential to have security awareness and training programs?

To allow employees to bypass security controls when needed

To reduce costs by replacing cybersecurity tools with trained employees

To ensure employees follow security policies and procedures

To make IT security optional

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can organizations maintain the effectiveness of security controls?

Implementing them once and never updating them

Monitoring their operation and making adjustments as needed

Trusting employees to report security breaches

) Disabling controls during peak business hours

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should an organization do when a cyberattack is detected?

Ignore it until it causes significant damage

Wait for government agencies to take action

React immediately with a predefined incident response plan

Shut down the entire IT infrastructure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common way to handle risk?

Avoid

Transfer

Ignore

Mitigate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does it mean to "transfer" a risk in cybersecurity?

) Eliminating the risk completely

Ignoring the risk and hoping it does not happen

Assigning the risk to an internal IT team

Sharing the risk with a third party, such as cyber insurance or outsourcing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?