Information Security Quiz

Information Security Quiz

University

20 Qs

quiz-placeholder

Similar activities

Quiz on Vulnerabilities and Risk Assessment

Quiz on Vulnerabilities and Risk Assessment

University

15 Qs

PCII DSS and GDPR

PCII DSS and GDPR

University

20 Qs

Q6. Entity Clustering

Q6. Entity Clustering

University

15 Qs

Lớp 7 chủ đề 1 p2

Lớp 7 chủ đề 1 p2

7th Grade - University

25 Qs

SPC UNIT I

SPC UNIT I

University

20 Qs

Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

University

19 Qs

InfoSec Quiz 1

InfoSec Quiz 1

University

15 Qs

Windows File Sharing Quiz

Windows File Sharing Quiz

University

19 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Edward Adu

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines "risk" in the context of information security?

The likelihood that a threat will occur regardless of vulnerabilities

The potential for loss or damage when a threat exploits a vulnerability

The vulnerability of an asset to any external threat

The total number of threats identified in an organization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During risk identification, which of the following is NOT typically considered an asset?

Software applications

Employee personal opinions

Hardware devices

Organizational data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most accurate description of a vulnerability?

A threat actor targeting an organization

A weakness that can be exploited by a threat

A security control implemented to reduce risk

An event causing damage to an asset

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In risk assessment, what is the primary purpose of prioritizing risks as High, Medium, or Low?

To categorize assets by value

To determine the order in which risks should be mitigated

To decide which threats to ignore

To classify vulnerabilities by severity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a detective control?

Firewall

Intrusion Detection System (IDS)

Regular data backups

Strong password policies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key difference between risk acceptance and risk avoidance?

Acceptance involves transferring risk to a third party, avoidance does not

Acceptance means no action is taken to mitigate risk, avoidance means eliminating the risk source

Acceptance requires implementing corrective controls, avoidance requires preventive controls

Acceptance is used only for low risks, avoidance only for high risks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security policy is primarily concerned with defining acceptable behavior for system users?

Data Protection Policy

Acceptable Use Policy

Password Policy

Incident Response Policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?