1-course, 3-part(18q)

1-course, 3-part(18q)

12th Grade

18 Qs

quiz-placeholder

Similar activities

Game Consoles

Game Consoles

5th - 12th Grade

20 Qs

Circulatory System Review I

Circulatory System Review I

10th - 12th Grade

20 Qs

Advanced Directives & Patient Rights

Advanced Directives & Patient Rights

11th - 12th Grade

15 Qs

Le Corps | Parts of the Body (Part 1)

Le Corps | Parts of the Body (Part 1)

9th - 12th Grade

17 Qs

Learning Check 1

Learning Check 1

12th Grade

15 Qs

Tradable Pollution Permits

Tradable Pollution Permits

11th - 12th Grade

14 Qs

SPM

SPM

1st Grade - University

20 Qs

Urinary System

Urinary System

9th - 12th Grade

17 Qs

1-course, 3-part(18q)

1-course, 3-part(18q)

Assessment

Quiz

Other

12th Grade

Medium

Created by

Nurly Nurly

Used 3+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once the organization has defined the policies that will guide its security program, the next step is to implement a program known as _____ that is designed to prepare employees to comply with the policy.

SETA

STEA

SecPol

ETAS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _____ a recommendation the user may use to help comply with a policy.

standard

procedure

ruleset

guideline

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that attempts to overwhelm a computer target's ability to handle incoming communications is known as _____.

denial of service

a virus

a worm

spam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _____ is a set of examples used to illustrate compliance with policy.

practice

standard

guideline

recomendation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual or group that creates or is responsible for a set of information is/are the _____.

data owners

data trustees

data custodians

data users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The longer the time between vulnerability assesments, _____.

the more likely new vulnerabilities can be exploited

the lower the chance older vulberablites will be used

the more you increase costs for testing

the easier it is to lower your risk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The category of threat that represents a situation where we mst rely on technology that cannot be easily replaced is known as _____.

technical hardware failure

mean time until failure

technological obsolesence

technical software failure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?