
IT Security Risk Assessment ,ISO270001,ISO13335 Approaches
Authored by Ritu Sharma
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in the IT Security Management Process?
Implementing security controls
Performing a security risk assessment
Determining IT security objectives and policies
Writing security procedures
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key factor when selecting security controls for an organization?
Cost-effectiveness in protecting IT assets
The latest trends in cybersecurity
Randomly applying controls to see what works
Relying solely on antivirus software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it essential to have security awareness and training programs?
To allow employees to bypass security controls when needed
To reduce costs by replacing cybersecurity tools with trained employees
To ensure employees follow security policies and procedures
To make IT security optional
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can organizations maintain the effectiveness of security controls?
Implementing them once and never updating them
Monitoring their operation and making adjustments as needed
Trusting employees to report security breaches
) Disabling controls during peak business hours
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should an organization do when a cyberattack is detected?
Ignore it until it causes significant damage
Wait for government agencies to take action
React immediately with a predefined incident response plan
Shut down the entire IT infrastructure
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a common way to handle risk?
Avoid
Transfer
Ignore
Mitigate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does it mean to "transfer" a risk in cybersecurity?
) Eliminating the risk completely
Ignoring the risk and hoping it does not happen
Assigning the risk to an internal IT team
Sharing the risk with a third party, such as cyber insurance or outsourcing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?