
Information Security Quiz

Quiz
•
Information Technology (IT)
•
University
•
Medium
Edward Adu
Used 1+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best defines "risk" in the context of information security?
The likelihood that a threat will occur regardless of vulnerabilities
The potential for loss or damage when a threat exploits a vulnerability
The vulnerability of an asset to any external threat
The total number of threats identified in an organization
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During risk identification, which of the following is NOT typically considered an asset?
Software applications
Employee personal opinions
Hardware devices
Organizational data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the most accurate description of a vulnerability?
A threat actor targeting an organization
A weakness that can be exploited by a threat
A security control implemented to reduce risk
An event causing damage to an asset
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In risk assessment, what is the primary purpose of prioritizing risks as High, Medium, or Low?
To categorize assets by value
To determine the order in which risks should be mitigated
To decide which threats to ignore
To classify vulnerabilities by severity
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a detective control?
Firewall
Intrusion Detection System (IDS)
Regular data backups
Strong password policies
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the key difference between risk acceptance and risk avoidance?
Acceptance involves transferring risk to a third party, avoidance does not
Acceptance means no action is taken to mitigate risk, avoidance means eliminating the risk source
Acceptance requires implementing corrective controls, avoidance requires preventive controls
Acceptance is used only for low risks, avoidance only for high risks
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security policy is primarily concerned with defining acceptable behavior for system users?
Data Protection Policy
Acceptable Use Policy
Password Policy
Incident Response Policy
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
NET102: Quiz No. 1

Quiz
•
University
20 questions
RIDDLE_IT_OUT

Quiz
•
University
25 questions
IT 637 Mid-Term Examination

Quiz
•
University
20 questions
Cloud Service Models & Software Process Models

Quiz
•
2nd Grade - University
15 questions
Factors of Production and Economic Concepts Assessment

Quiz
•
10th Grade - University
20 questions
Usable Encryption Quiz

Quiz
•
University
25 questions
Revision

Quiz
•
University
15 questions
ISP and Data Packets Part 2

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University