
D1 part1
Authored by Di Thoi7
Computers
Professional Development
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Alyssa is responsible for her organization’s security awareness program. She is concerned that changes in technology may make the content outdated. What control can she put in place to protect against this risk?
Gamification
Computer-based training
Content reviews
Live training
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Gavin is creating a report to management on the results of his most recent risk assessment. In his report, he would like to identify the remaining level of risk to the organization after adopting security controls. What term best describes this current level of risk?
Inherent risk
Residual risk
Control risk
Mitigated risk
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Francine is a security specialist for an online service provider in the United States. She recently received a claim from a copyright holder that a user is storing information on her service that violates the third party’s copyright. What law governs the actions that Francine must take?
Copyright Act
Lanham Act
Digital Millennium Copyright Act
Gramm Leach Bliley Act
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
FlyAway Travel has offices in both the European Union (EU) and the United States and transfers personal information between those offices regularly. They have recently received a request from an EU customer requesting that their account be terminated. Under the General Data Protection Regulation (GDPR), which requirement for processing personal information states that individuals may request that their data no longer be disseminated or processed?
The right to access
Privacy by design
The right to be forgotten
The right of data portability
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
After conducting a qualitative risk assessment of her organization, Sally recommends purchasing cybersecurity breach insurance. What type of risk response behavior is she recommending?
Accept
Transfer
Reduce
Reject
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which one of the following elements of information is not considered personally identifiable information that would trigger most United States (U.S.) state data breach laws?
Student identification number
Social Security number
Driver’s license number
Credit card number
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Renee is speaking to her board of directors about their responsibilities to review cyberse- curity controls. What rule requires that senior executives take personal responsibility for information security matters?
Due diligence rule
Personal liability rule
Prudent man rule
Due process rule
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?