New SB#1 LA

New SB#1 LA

Professional Development

5 Qs

quiz-placeholder

Similar activities

M4-Q4

M4-Q4

Professional Development

10 Qs

CISSP Domain 2 (Asset Security)

CISSP Domain 2 (Asset Security)

Professional Development

10 Qs

Software Security

Software Security

University - Professional Development

10 Qs

ISRM1 Day 2 PM

ISRM1 Day 2 PM

Professional Development

10 Qs

Process of Security Design

Process of Security Design

Professional Development

10 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

M4Q3

M4Q3

Professional Development

10 Qs

The Need for Cybersecurity

The Need for Cybersecurity

Professional Development

10 Qs

New SB#1 LA

New SB#1 LA

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

sudiyuwono wowo

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following options presents a vulnerability in Prindos’ system?

Server downtime and slow response times

Insufficient software testing for high user loads

Cloud auto-scaling features to dynamically allocate resources

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The update of the software failed due to the lack of staff. What is Prindos facing in this case?

A personnel vulnerability

A human actions threat

An organizational threat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As part of the ISMS implementation, Prindos defined clear roles and responsibilities for the software development team. What is the function of this control?

Preventive

Detective

Corrective

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of security controls did Prindos implement to address segregation of duties issues?

Managerial control

Administrative control

Legal control

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Did Prindos follow best practices before selecting the necessary controls for implementation?

Yes, Prindos adhered to best practices when selecting the necessary information security controls

No, Prindos should have initially chosen the necessary controls for information security before conducting a risk assessment

No, Prindos should have initially performed a vulnerability assessment