3.12_Risk_&_Vulnerability_Management

3.12_Risk_&_Vulnerability_Management

Professional Development

10 Qs

quiz-placeholder

Similar activities

mobile security quiz

mobile security quiz

Professional Development

7 Qs

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

AI and its Risk

AI and its Risk

Professional Development

10 Qs

OSI Model - Data Link Layer

OSI Model - Data Link Layer

9th Grade - Professional Development

10 Qs

Quiz

Quiz

Professional Development

10 Qs

Lesson 5.2 Conducting an InfoSec Risk Assessment

Lesson 5.2 Conducting an InfoSec Risk Assessment

Professional Development

15 Qs

Modelo Emergente Preventivo para producir software seguro

Modelo Emergente Preventivo para producir software seguro

Professional Development

10 Qs

3.12_Risk_&_Vulnerability_Management

3.12_Risk_&_Vulnerability_Management

Assessment

Quiz

Computers

Professional Development

Hard

Created by

SHUSHANT TRIPATHI

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following items are prerequisites for risk to exist? (Choose three.)

A vulnerability

A Threat

A person

An asset

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following can be vulnerabilities? (Choose three.)

The location of a building

Misconfigured systems

Unpatched systems

Disgruntled former employees

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following controls protects data in motion?

File system permissions

Full disk encryption

Protocol encryption

Process isolation

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two inputs does qualitative risk analysis use? (Choose two.)

Asset value

Likelihood

Exposure factor

Impact

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which steps are generally conducted in preparation for vulnerability assessments? (Choose two.)

Applying remediations

Prioritization of assets

Discovery of the devices on our networks

Verification that remediations are working properly

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of detective controls? (Choose two.)

Security camera

Firewall

IDS

Disk encryption

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two components are multiplied in quantitative risk analysis? (Choose two.)

Likelihood

Single loss expectancy (SLE)

Impact

Annualized rate of occurrence (ARO)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?