
Domain 2 - Daily Questions - 16.06.2025

Quiz
•
Information Technology (IT)
•
Professional Development
•
Hard

Nivedita Newar
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To eliminate all security risks
To ensure compliance with regulations
To align risk responses with business objectives
To implement technical controls
Answer explanation
Correct Answer: C
Explanation: Risk management aims to align risk treatment with business goals, ensuring informed decision-making.
Incorrect Options:
A: Eliminating all risks is unrealistic and not cost-effective.
B: Compliance is a component, not the primary purpose.
D: Controls are part of risk treatment, not the overall purpose.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following BEST describes residual risk?
Risk that has been transferred to a third party
Risk that remains after controls are implemented
Risk that is accepted without mitigation
Risk that is identified during audits
Answer explanation
Correct Answer: B
Explanation: Residual risk is the remaining risk after mitigation strategies have been applied.
Incorrect Options:
A: Transferred risk is handled by another party, not residual.
C: Accepted risk may be residual but not always.
D: Audit findings may reveal risks but don’t define residual risk.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the MOST important factor when prioritizing risk treatment options?
Cost of implementation
Regulatory requirements
Business impact and likelihood ✅
Availability of technical solutions
Answer explanation
Correct Answer: C
Explanation: Risk prioritization is based on the potential impact and likelihood of occurrence.
Incorrect Options:
A: Cost is important but secondary to risk severity.
B: Regulations guide treatment but don’t determine priority.
D: Technical feasibility supports implementation, not prioritization.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the BEST reason to perform a risk assessment regularly?
To meet audit requirements
To update the incident response plan
To identify changes in the threat landscape ✅
To justify security budgets
Answer explanation
Correct Answer: C
Explanation: Regular assessments help detect new threats and vulnerabilities affecting the organization.
Incorrect Options:
A: Audits may require assessments, but that’s not the best reason.
B: Incident response updates are a result, not a reason.
D: Budget justification is a benefit, not the primary reason.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the MOST appropriate action when a risk is identified but cannot be mitigated cost-effectively?
Ignore the risk
Transfer the risk
Accept the risk with management approval ✅
Escalate the risk to the IT department
Answer explanation
Correct Answer: C
Explanation: Accepting risk is valid when mitigation is impractical, provided it’s approved by management.
Incorrect Options:
A: Ignoring risk is irresponsible and dangerous.
B: Transferring may not be feasible or cost-effective.
D: IT may manage controls but cannot approve risk acceptance.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the PRIMARY role of a risk register in information risk management?
To document security policies
To track compliance issues
To record and monitor identified risks ✅
To list approved security tools
Answer explanation
Correct Answer: C
Explanation: A risk register is a central repository for tracking risks, their status, and treatment plans.
Incorrect Options:
A: Policies are documented separately.
B: Compliance issues may be included but are not the focus.
D: Tools are part of implementation, not risk tracking.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following BEST supports a risk-based approach to information security?
Implementing firewalls and antivirus software
Conducting regular penetration tests
Aligning security controls with risk assessments ✅
Enforcing strict password policies
Answer explanation
Correct Answer: C
Explanation: A risk-based approach ensures controls are selected based on assessed risks.
Incorrect Options:
A: These are generic controls, not necessarily risk-driven.
B: Pen tests help identify risks but don’t define the approach.
D: Password policies are important but not risk-based by default.
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the PRIMARY benefit of integrating risk management into the system development life cycle (SDLC)?
It reduces the cost of development
It ensures faster deployment
It identifies and mitigates risks early ✅
It improves user interface design
Answer explanation
Correct Answer: C
Explanation: Early risk identification in SDLC helps prevent costly fixes and ensures secure design.
Incorrect Options:
A: Cost reduction may occur but is not the primary benefit.
B: Security integration may slow deployment initially.
D: UI design is unrelated to risk management.
Similar Resources on Quizizz
10 questions
Activity 2 - ISMS

Quiz
•
Professional Development
10 questions
JavaScript Variables & Hoisting Quiz

Quiz
•
Professional Development
10 questions
SESSION 4_Technology in Educational Arena: Various Application i

Quiz
•
Professional Development
10 questions
Application Security

Quiz
•
Professional Development
10 questions
Microsoft IT Pro Community Meetup - September

Quiz
•
Professional Development
10 questions
Project Management Bespoke Lesson 1

Quiz
•
Professional Development
10 questions
The BIG PM quiz

Quiz
•
Professional Development
6 questions
OSS Security

Quiz
•
Professional Development
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade