Search Header Logo

Application of IT Security

Authored by 25B30 Instructors

Professional Development

Professional Development

Used 7+ times

Application of IT Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are examples of assets in an organization?

Buildings

Data

Attackers

Recipes

Vulnerabilities

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements about vulnerabilities are true? (Select all that apply)

Vulnerabilities are weaknesses or absences of countermeasures.

Vulnerabilities can be found in personnel.

Unrestricted access to a folder on a computer is an example of a vulnerability.

Vulnerabilities always lead to immediate threats.

Vulnerability assessments are used to identify vulnerabilities.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Regarding threats and threat agents, which statements are correct? (Select all that apply)

A threat happens only when a vulnerability is exploited.

A threat agent can be an attacker who exploits a vulnerability.

Not all threat agents will exploit vulnerabilities.

A threat agent is the same as a vulnerability.

Threat agents carry out threats but cannot discover vulnerabilities.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

According to NIST SP 800-30, which of the following are common information-gathering techniques used in risk analysis?

Automated risk assessment tools

Interviews

Social media monitoring

Questionnaires

Policy document reviews

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple sources should be used to determine the risks to a single asset during risk analysis.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What two factors combine to determine risk in the risk management process?

Threat and asset value

Likelihood and impact

Vulnerability and threat agent

Asset value and vulnerability

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Hackers typically hack for which of the following reasons?

Financial gain

Disruption

Geopolitical change

Notoriety

Environmental protection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?