MCyber_Chap26N27

MCyber_Chap26N27

Professional Development

23 Qs

quiz-placeholder

Similar activities

La cybersécurité, j’assure … vraiment ?

La cybersécurité, j’assure … vraiment ?

Professional Development

20 Qs

WordPress: Instalación y configuración

WordPress: Instalación y configuración

Professional Development

20 Qs

3TDS-BANCO DE DADOS

3TDS-BANCO DE DADOS

Professional Development

20 Qs

Quiz 1 - 21/08/2025

Quiz 1 - 21/08/2025

Professional Development

20 Qs

Fundamentos de Seguridad de la Información

Fundamentos de Seguridad de la Información

Professional Development

20 Qs

Networking Devices and Protocols Quiz

Networking Devices and Protocols Quiz

Professional Development

20 Qs

Structured Cabling and Networking Quiz

Structured Cabling and Networking Quiz

Professional Development

20 Qs

Fundamentos Python e Condicionais

Fundamentos Python e Condicionais

Professional Development

20 Qs

MCyber_Chap26N27

MCyber_Chap26N27

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Marcus Phang

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?
Exposure factor
Hardware
Quantitative
Qualitative

Answer explanation

Physical items can be assigned a value for quantitative analysis.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two types of controls are effective after a violation of a security policy occurs? (Choose two.)
Corrective
Preventive
Recovery
Deterrent
Compensative

Answer explanation

Organizations will implement corrective access controls after a system experiences a threat.

Recovery security controls restore resources, functions and capabilities back to a normal state after a violation of a security policy.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of security control includes backup and restore operations, as well as fault-tolerant data storage?
Deterrent
Recovery
Detection
Compensative

Answer explanation

Recovery security controls restore resources, functions and capabilities back to a normal state after a violation of a security policy.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The CEO of a company is concerned that if a data breach should occur and customer data is exposed, the company could be sued. The CEO makes the decision to buy insurance for the company. What type of risk mitigation is the CEO implementing?
Avoidance
Mitigation
Transference
Reduction

Answer explanation

Buying insurance transfers the risk to a third party.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
Masking
Deterrent
Detective
Preventive

Answer explanation

Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which access control should the IT department use to restore a system back to its normal state?
Compensative
Preventive
Corrective
Detective

Answer explanation

Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Based on the risk management process, what should the cybersecurity team do as the next step when a cybersecurity risk is identified?
Frame the risk
Monitor the risk.
Respond to the risk.
Assess the risk

Answer explanation

Risk management is a formal process that reduces the impact of threats and vulnerabilities. The process involves four general steps:

1) Frame the risk – Identify the threats throughout the organization that increase risk.

2) Assess the risk – Once a risk has been identified, it is assessed and analyzed to determine the severity that the threat poses.

3) Respond to the risk – Develop an action plan to reduce overall organization risk exposure. Management should rank and prioritize threats and a team determines how to respond to each threat.

4) Monitor the risk – Continuously review risk reductions due to elimination, mitigation and transfer actions.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?