Midterm 2 Quiz

Midterm 2 Quiz

12th Grade

29 Qs

quiz-placeholder

Similar activities

Tech Quiz 2025-26

Tech Quiz 2025-26

9th Grade - University

30 Qs

IT Service Delivery and Backup Strategies

IT Service Delivery and Backup Strategies

12th Grade

28 Qs

Digital Asset Review

Digital Asset Review

10th Grade - University

26 Qs

IT Balance Quiz

IT Balance Quiz

9th - 12th Grade

25 Qs

Cambridge Technicals in IT - Unit 02 - LO3.6

Cambridge Technicals in IT - Unit 02 - LO3.6

11th - 12th Grade

25 Qs

Processors and Virtual Machines

Processors and Virtual Machines

12th Grade

25 Qs

Aplication Domain: Social Media and Crowdsourcing

Aplication Domain: Social Media and Crowdsourcing

12th Grade - University

24 Qs

CSC1313 QUIZ 1

CSC1313 QUIZ 1

7th Grade - University

30 Qs

Midterm 2 Quiz

Midterm 2 Quiz

Assessment

Quiz

Information Technology (IT)

12th Grade

Easy

Created by

Anel Aqtasova

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While planning an individual audit assignment, an IS auditor should consider the following:

Prior audit reports

Risk assessment reports

Regulatory requirements

All the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of deterrent control?

Installation of surveillance cameras with warning signs about filming.

Automatic backup of data to restore it in case of loss.

Installing anti-virus software to detect malware.

Regularly testing the system for vulnerabilities to eliminate them.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can be identified as correct formula for the residual risk?

Residual risk = Gross risk – risks covered by the implemented control

Residual risk = Net risk - risks covered by the implemented control

Residual risk = Gross risk – net risk

Residual risk = Net risk – Gross risk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must be included in change management policy?

SoD

Requirements for roll-back plans

Emergency change management

All the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following description is an example of which control: “In a human resources system, an employee's age can be limited from 18 to 65. If someone enters a value of 70, the system will reject it because it is outside the acceptable range”?

Data integrity principles

Checksums

Checkdigits

Limit checks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a management’s risk appetite?

The level of risk that an organization is willing to accept in pursuit of its objectives.

A detailed process of identifying and mitigating all risks within an organization.

The minimum level of risk that an organization is legally required to avoid.

The set of policies used to eliminate all potential risks to the organization.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the options below is not a type of authentication?

Something you know

Something you have

Something you are

None of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?