Application of IT Security

Application of IT Security

Professional Development

50 Qs

quiz-placeholder

Similar activities

lorem ipsum AWS D4 cap.1-2

lorem ipsum AWS D4 cap.1-2

Professional Development

55 Qs

Sec+ 601 Final Review Week

Sec+ 601 Final Review Week

Professional Development

52 Qs

ACE-3

ACE-3

Professional Development

50 Qs

PDE-2022-3

PDE-2022-3

Professional Development

50 Qs

Google Professional Cloud Security Engineer Exam (Part 2)

Google Professional Cloud Security Engineer Exam (Part 2)

Professional Development

51 Qs

Quality Engineering - Online Assessment

Quality Engineering - Online Assessment

Professional Development

45 Qs

Oracle Cloud Infrastructure 2023 Multicloud Architect Associate

Oracle Cloud Infrastructure 2023 Multicloud Architect Associate

Professional Development

53 Qs

REDES1

REDES1

University - Professional Development

50 Qs

Application of IT Security

Application of IT Security

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

25B30 Instructors

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are examples of assets in an organization?

Buildings

Data

Attackers

Recipes

Vulnerabilities

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements about vulnerabilities are true? (Select all that apply)

Vulnerabilities are weaknesses or absences of countermeasures.

Vulnerabilities can be found in personnel.

Unrestricted access to a folder on a computer is an example of a vulnerability.

Vulnerabilities always lead to immediate threats.

Vulnerability assessments are used to identify vulnerabilities.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Regarding threats and threat agents, which statements are correct? (Select all that apply)

A threat happens only when a vulnerability is exploited.

A threat agent can be an attacker who exploits a vulnerability.

Not all threat agents will exploit vulnerabilities.

A threat agent is the same as a vulnerability.

Threat agents carry out threats but cannot discover vulnerabilities.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

According to NIST SP 800-30, which of the following are common information-gathering techniques used in risk analysis?

Automated risk assessment tools

Interviews

Social media monitoring

Questionnaires

Policy document reviews

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple sources should be used to determine the risks to a single asset during risk analysis.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What two factors combine to determine risk in the risk management process?

Threat and asset value

Likelihood and impact

Vulnerability and threat agent

Asset value and vulnerability

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Hackers typically hack for which of the following reasons?

Financial gain

Disruption

Geopolitical change

Notoriety

Environmental protection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?