Test blanc

Test blanc

University

20 Qs

quiz-placeholder

Similar activities

Organizational Culture

Organizational Culture

University

20 Qs

Principles of Security

Principles of Security

University

20 Qs

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

ISA111 - QUIZ #1

ISA111 - QUIZ #1

University

21 Qs

Information Assurance Final Quiz

Information Assurance Final Quiz

University

15 Qs

SFH-B Section-III Test

SFH-B Section-III Test

University

20 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

Jan21 CS Group 1 Revision Part 2: Chapters 7, 8 and 9

Jan21 CS Group 1 Revision Part 2: Chapters 7, 8 and 9

University

25 Qs

Test blanc

Test blanc

Assessment

Quiz

Computers

University

Medium

Created by

Abdelghafour Ajoua

Used 10+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cybersecurity activities should be coordinated by:

Representatives from different parts of the organization with relevant roles and job functions

The chief information security officer

The cybersecurity program manager

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

“Level of risk” is defined with the following statement

Magnitude of a risk expressed in terms of the potential vulnerabilities and the threats that they possess

List of risks with value levels assigned

Magnitude of a risk expressed in terms of the combination of consequences and their likelihood

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The risk that remains after the implementation of controls aiming to reduce the inherent risk is defined as

Treated risk

Residual risk

Avoided risk

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Monitoring systems which do not respond to anything against incoming packets found within the Darknet IP domains refers to

Black hole monitoring

White hole monitoring

Gray hole monitoring

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Please determine the correct definition of threats in the cyberspace

Potential cause of an unwanted incident, which may result in harm to a system, individual or organization

Weakness of an asset or control that can be exploited

Effect of uncertainty on objectives

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The expression of the intent of the organization to treat the risks identified and/or to comply with requirements of organizational security is the objective of

Cybersecurity program

Information security program

Cyberspace program

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the risk treatment options the organization is adopting, in the scenario when it has recently conducted a risk assessment of their IT systems and decided to cancel the e-commerce activity to eliminate the risk of an accidental phishing threat?

Risk Modification

Risk Elimination

Risk Avoidance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?