
MCyber_Chap26N27
Quiz
•
Information Technology (IT)
•
Professional Development
•
Practice Problem
•
Hard
Marcus Phang
FREE Resource
Enhance your content in a minute
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?
Answer explanation
Physical items can be assigned a value for quantitative analysis.
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which two types of controls are effective after a violation of a security policy occurs? (Choose two.)
Answer explanation
Organizations will implement corrective access controls after a system experiences a threat.
Recovery security controls restore resources, functions and capabilities back to a normal state after a violation of a security policy.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which type of security control includes backup and restore operations, as well as fault-tolerant data storage?
Answer explanation
Recovery security controls restore resources, functions and capabilities back to a normal state after a violation of a security policy.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The CEO of a company is concerned that if a data breach should occur and customer data is exposed, the company could be sued. The CEO makes the decision to buy insurance for the company. What type of risk mitigation is the CEO implementing?
Answer explanation
Buying insurance transfers the risk to a third party.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
Answer explanation
Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which access control should the IT department use to restore a system back to its normal state?
Answer explanation
Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Based on the risk management process, what should the cybersecurity team do as the next step when a cybersecurity risk is identified?
Answer explanation
Risk management is a formal process that reduces the impact of threats and vulnerabilities. The process involves four general steps:
1) Frame the risk – Identify the threats throughout the organization that increase risk.
2) Assess the risk – Once a risk has been identified, it is assessed and analyzed to determine the severity that the threat poses.
3) Respond to the risk – Develop an action plan to reduce overall organization risk exposure. Management should rank and prioritize threats and a team determines how to respond to each threat.
4) Monitor the risk – Continuously review risk reductions due to elimination, mitigation and transfer actions.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Project Retrospectives
Quiz
•
Professional Development
20 questions
React Redux
Quiz
•
Professional Development
21 questions
De datos a decisiones
Quiz
•
Professional Development
24 questions
SDLC2.0 Solution Release Doc -Quiz #1.1
Quiz
•
Professional Development
25 questions
Quiz on RAM and Storage Devices
Quiz
•
Professional Development
25 questions
Quizz Segurança e conformidade AWS
Quiz
•
Professional Development
27 questions
Cybersecurity Core Functions-QUIZ
Quiz
•
Professional Development
20 questions
AV2 - INFORMÁTICA BÁSICA E MANUTENÇÃO DE MICROS
Quiz
•
Professional Development
Popular Resources on Wayground
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
15 questions
Solving Equations with Variables on Both Sides Review
Quiz
•
8th Grade
Discover more resources for Information Technology (IT)
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
20 questions
Disney Characters
Quiz
•
Professional Development
20 questions
Customer Service
Quiz
•
Professional Development
10 questions
Food Idioms
Quiz
•
Professional Development
20 questions
NCCER Power Tools Quiz
Quiz
•
Professional Development
