EY + GRC + Auditing + IT + Cybersecurity Quiz

EY + GRC + Auditing + IT + Cybersecurity Quiz

University

56 Qs

quiz-placeholder

Similar activities

220 1002 Final Review

220 1002 Final Review

University

60 Qs

Business Finance Endterm Exam

Business Finance Endterm Exam

University

60 Qs

Security Management - Chapter 1

Security Management - Chapter 1

University

60 Qs

unit 3,9,12, 13

unit 3,9,12, 13

University

58 Qs

EP Integration

EP Integration

University

54 Qs

Microsoft Azure Fundamentals AZ-900 ENG #4

Microsoft Azure Fundamentals AZ-900 ENG #4

University - Professional Development

55 Qs

SE Revision IV

SE Revision IV

University

53 Qs

CBT MOCK 5

CBT MOCK 5

University

60 Qs

EY + GRC + Auditing + IT + Cybersecurity Quiz

EY + GRC + Auditing + IT + Cybersecurity Quiz

Assessment

Quiz

Computers

University

Medium

Created by

dharmendhar singh

Used 1+ times

FREE Resource

56 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which of the following best describes the purpose of GRC?

Increase sales and revenue

Align IT with business goals, manage risks, ensure compliance

Reduce hardware costs

Automate HR operations

2.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

In risk management, which is NOT a risk response strategy?

Avoidance

Mitigation

Acceptance

Duplication

3.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which framework is commonly used for IT governance?

ISO 9001

COBIT

CMMI

PMBOK

4.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which is an example of compliance risk?

Competitor gaining market share

Employee fraud

Violation of GDPR data protection rules

System downtime

5.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

The “Three Lines of Defense” model in GRC includes all EXCEPT:

Operational Management

Risk & Compliance Functions

Internal Audit

External Customers

6.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which law/regulation primarily deals with protecting health data?

HIPAA

SOX

GDPR

PCI-DSS

7.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

In risk assessment, the formula for risk is typically:

Risk = Threat ÷ Vulnerability

Risk = Likelihood × Impact

Risk = Asset + Control

Risk = Compliance × Policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?