EY + GRC + Auditing + IT + Cybersecurity Quiz

EY + GRC + Auditing + IT + Cybersecurity Quiz

University

56 Qs

quiz-placeholder

Similar activities

webdev ii

webdev ii

University

52 Qs

DFC10033 PRACTICE SET

DFC10033 PRACTICE SET

University

60 Qs

ATM OPERATIONS

ATM OPERATIONS

University

59 Qs

Microprocessor & Microcontroller Basics

Microprocessor & Microcontroller Basics

University

60 Qs

computer memory and storage

computer memory and storage

University

52 Qs

Preparing for MTA Certification

Preparing for MTA Certification

KG - University

60 Qs

Associate Diploma in Software Development Quiz- Set 1 (Amal)

Associate Diploma in Software Development Quiz- Set 1 (Amal)

University

60 Qs

EEP

EEP

University

53 Qs

EY + GRC + Auditing + IT + Cybersecurity Quiz

EY + GRC + Auditing + IT + Cybersecurity Quiz

Assessment

Quiz

Computers

University

Medium

Created by

dharmendhar singh

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

56 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which of the following best describes the purpose of GRC?

Increase sales and revenue

Align IT with business goals, manage risks, ensure compliance

Reduce hardware costs

Automate HR operations

2.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

In risk management, which is NOT a risk response strategy?

Avoidance

Mitigation

Acceptance

Duplication

3.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which framework is commonly used for IT governance?

ISO 9001

COBIT

CMMI

PMBOK

4.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which is an example of compliance risk?

Competitor gaining market share

Employee fraud

Violation of GDPR data protection rules

System downtime

5.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

The “Three Lines of Defense” model in GRC includes all EXCEPT:

Operational Management

Risk & Compliance Functions

Internal Audit

External Customers

6.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which law/regulation primarily deals with protecting health data?

HIPAA

SOX

GDPR

PCI-DSS

7.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

In risk assessment, the formula for risk is typically:

Risk = Threat ÷ Vulnerability

Risk = Likelihood × Impact

Risk = Asset + Control

Risk = Compliance × Policy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?