The Cybersecurity Landscape

The Cybersecurity Landscape

Professional Development

18 Qs

quiz-placeholder

Similar activities

Fundamentals of Cyber Security

Fundamentals of Cyber Security

Professional Development

15 Qs

Basics of Cybersecurity

Basics of Cybersecurity

Professional Development

15 Qs

CEH Study Guide - 03 Security Foundations

CEH Study Guide - 03 Security Foundations

Professional Development

20 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

Security and Domain

Security and Domain

Professional Development

20 Qs

Colors_unit2

Colors_unit2

Professional Development

20 Qs

Intro to Cybersecurity - Review 1

Intro to Cybersecurity - Review 1

Professional Development

20 Qs

The Cybersecurity Landscape

The Cybersecurity Landscape

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Neo 0101

Used 3+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A list of email addresses from customers of the Splunk T-Shirt company has been disclosed by accident. What are the most likely impacts of this incident? (Select 2)

  • The company will have to pay attorney's fees


  • Increased risk of Identity theft for individuals

  • Interruption of critical services


  • Damage to the company's reputation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action for Risk Identification in this scenario: An organization moves their data center to an area away from frequent natural disasters

Accept

Avoid

Mitigate

Transfer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action for Risk Identification in this scenario: An organization decides to use third-party cloud software instead of developing in-house

Avoid

Accept

Mitigate

Transfer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action for Risk Identification in this scenario: An organization installs Anti-Malware software on employee devices

Mitigate

Avoid

Acceptance

Transfer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action for Risk Identification in this scenario: An organization documents the risk of offering their services online

Avoid

Transfer

Accept

Mitigate

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the frameworks mentioned in this course represents a broad consensus about the most critical security risks to web applications?

OWASP Top 10

ISO/IEC 27000 series

CIS 18

NIST CSF

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Authorization mean?

No party can deny the validity of the data

Ensuring that protected information is only seen by those who are meant to see it

Being able to verify the identity of a user, process or device

Refers to the access that should be granted to a user, process or device

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?