
MCyber_Chap26N27
Authored by Marcus Phang
Information Technology (IT)
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?
Answer explanation
Physical items can be assigned a value for quantitative analysis.
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which two types of controls are effective after a violation of a security policy occurs? (Choose two.)
Answer explanation
Organizations will implement corrective access controls after a system experiences a threat.
Recovery security controls restore resources, functions and capabilities back to a normal state after a violation of a security policy.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which type of security control includes backup and restore operations, as well as fault-tolerant data storage?
Answer explanation
Recovery security controls restore resources, functions and capabilities back to a normal state after a violation of a security policy.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The CEO of a company is concerned that if a data breach should occur and customer data is exposed, the company could be sued. The CEO makes the decision to buy insurance for the company. What type of risk mitigation is the CEO implementing?
Answer explanation
Buying insurance transfers the risk to a third party.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
Answer explanation
Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which access control should the IT department use to restore a system back to its normal state?
Answer explanation
Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Based on the risk management process, what should the cybersecurity team do as the next step when a cybersecurity risk is identified?
Answer explanation
Risk management is a formal process that reduces the impact of threats and vulnerabilities. The process involves four general steps:
1) Frame the risk – Identify the threats throughout the organization that increase risk.
2) Assess the risk – Once a risk has been identified, it is assessed and analyzed to determine the severity that the threat poses.
3) Respond to the risk – Develop an action plan to reduce overall organization risk exposure. Management should rank and prioritize threats and a team determines how to respond to each threat.
4) Monitor the risk – Continuously review risk reductions due to elimination, mitigation and transfer actions.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
21 questions
Remote Support and Scripting Best Practices
Quiz
•
Professional Development
25 questions
React and NodeJS with Docker
Quiz
•
Professional Development
28 questions
Computer Hardware and Troubleshooting Quiz
Quiz
•
Professional Development
20 questions
Quiz 1: Exception Handling
Quiz
•
Professional Development
20 questions
Prelim: Networking II
Quiz
•
Professional Development
20 questions
MSBTE Quiz
Quiz
•
Professional Development
20 questions
NMC-IT PD 2024
Quiz
•
Professional Development
19 questions
SENAI 2024 | REDES 1
Quiz
•
Professional Development
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
44 questions
Would you rather...
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
14 questions
Valentine's Day Trivia!
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development