Domain 2 - Daily Questions - 16.06.2025

Domain 2 - Daily Questions - 16.06.2025

Professional Development

8 Qs

quiz-placeholder

Similar activities

DEAM (Quiz 1)

DEAM (Quiz 1)

Professional Development

11 Qs

Project Management Bespoke Lesson 2

Project Management Bespoke Lesson 2

Professional Development

10 Qs

SpidervellA CyberSecurity Quiz

SpidervellA CyberSecurity Quiz

Professional Development

10 Qs

Data Governance Demystified: Simple Steps for Big Impact

Data Governance Demystified: Simple Steps for Big Impact

Professional Development

10 Qs

EarleandWilson_TC_223052025

EarleandWilson_TC_223052025

Professional Development

11 Qs

OT Cyber Security Audit Workshop

OT Cyber Security Audit Workshop

Professional Development

8 Qs

Project Management Bespoke Lesson 1

Project Management Bespoke Lesson 1

Professional Development

10 Qs

Cloud Practitioner Essentials Quiz

Cloud Practitioner Essentials Quiz

Professional Development

10 Qs

Domain 2 - Daily Questions - 16.06.2025

Domain 2 - Daily Questions - 16.06.2025

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Nivedita Newar

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the PRIMARY purpose of information risk management in an enterprise?

To eliminate all security risks

To ensure compliance with regulations

To align risk responses with business objectives

To implement technical controls

Answer explanation

Correct Answer: C
Explanation: Risk management aims to align risk treatment with business goals, ensuring informed decision-making.

Incorrect Options:

  • A: Eliminating all risks is unrealistic and not cost-effective.

  • B: Compliance is a component, not the primary purpose.

  • D: Controls are part of risk treatment, not the overall purpose.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST describes residual risk?

Risk that has been transferred to a third party

Risk that remains after controls are implemented

Risk that is accepted without mitigation

Risk that is identified during audits

Answer explanation

Correct Answer: B
Explanation: Residual risk is the remaining risk after mitigation strategies have been applied.

Incorrect Options:

  • A: Transferred risk is handled by another party, not residual.

  • C: Accepted risk may be residual but not always.

  • D: Audit findings may reveal risks but don’t define residual risk.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the MOST important factor when prioritizing risk treatment options?

Cost of implementation

Regulatory requirements

Business impact and likelihood ✅

Availability of technical solutions

Answer explanation

Correct Answer: C
Explanation: Risk prioritization is based on the potential impact and likelihood of occurrence.

Incorrect Options:

  • A: Cost is important but secondary to risk severity.

  • B: Regulations guide treatment but don’t determine priority.

  • D: Technical feasibility supports implementation, not prioritization.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the BEST reason to perform a risk assessment regularly?

To meet audit requirements

To update the incident response plan

To identify changes in the threat landscape ✅

To justify security budgets

Answer explanation

Correct Answer: C
Explanation: Regular assessments help detect new threats and vulnerabilities affecting the organization.

Incorrect Options:

  • A: Audits may require assessments, but that’s not the best reason.

  • B: Incident response updates are a result, not a reason.

  • D: Budget justification is a benefit, not the primary reason.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the MOST appropriate action when a risk is identified but cannot be mitigated cost-effectively?

Ignore the risk

Transfer the risk

Accept the risk with management approval ✅

Escalate the risk to the IT department

Answer explanation

Correct Answer: C
Explanation: Accepting risk is valid when mitigation is impractical, provided it’s approved by management.

Incorrect Options:

  • A: Ignoring risk is irresponsible and dangerous.

  • B: Transferring may not be feasible or cost-effective.

  • D: IT may manage controls but cannot approve risk acceptance.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the PRIMARY role of a risk register in information risk management?

To document security policies

To track compliance issues

To record and monitor identified risks ✅

To list approved security tools

Answer explanation

Correct Answer: C
Explanation: A risk register is a central repository for tracking risks, their status, and treatment plans.

Incorrect Options:

  • A: Policies are documented separately.

  • B: Compliance issues may be included but are not the focus.

  • D: Tools are part of implementation, not risk tracking.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST supports a risk-based approach to information security?

Implementing firewalls and antivirus software

Conducting regular penetration tests

Aligning security controls with risk assessments ✅

Enforcing strict password policies

Answer explanation

Correct Answer: C
Explanation: A risk-based approach ensures controls are selected based on assessed risks.

Incorrect Options:

  • A: These are generic controls, not necessarily risk-driven.

  • B: Pen tests help identify risks but don’t define the approach.

  • D: Password policies are important but not risk-based by default.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the PRIMARY benefit of integrating risk management into the system development life cycle (SDLC)?

It reduces the cost of development

It ensures faster deployment

It identifies and mitigates risks early ✅

It improves user interface design

Answer explanation

Correct Answer: C
Explanation: Early risk identification in SDLC helps prevent costly fixes and ensures secure design.

Incorrect Options:

  • A: Cost reduction may occur but is not the primary benefit.

  • B: Security integration may slow deployment initially.

  • D: UI design is unrelated to risk management.