Information Assurance and Security Final Term Quiz 1

Information Assurance and Security Final Term Quiz 1

University

30 Qs

quiz-placeholder

Similar activities

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

ISC2 - CC - Chapter 1 - Module 2

ISC2 - CC - Chapter 1 - Module 2

University

35 Qs

CISSP CH2 Asset Security

CISSP CH2 Asset Security

University

34 Qs

Module 1.1 - Introduction to GRC

Module 1.1 - Introduction to GRC

University

34 Qs

Digital Transformation

Digital Transformation

University - Professional Development

25 Qs

IAS 2 Asset Security Quiz 2

IAS 2 Asset Security Quiz 2

University

25 Qs

ITS301-Unit1 OHS Trial Test 2

ITS301-Unit1 OHS Trial Test 2

University

25 Qs

Jan21 CS Group 1 Revision Part 2: Chapters 7, 8 and 9

Jan21 CS Group 1 Revision Part 2: Chapters 7, 8 and 9

University

25 Qs

Information Assurance and Security Final Term Quiz 1

Information Assurance and Security Final Term Quiz 1

Assessment

Quiz

Computers

University

Medium

Created by

LODELIO MILLO

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What term describes the potential for loss or damage when a threat exploits a vulnerability?

Impact

Weakness

Risk

Threat

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When assessing risk, what does 'asset value' refer to?

Cost of the asset

Importance of the asset to the organization

Market price of the asset

Depreciation of the asset

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the term 'threat' mean in risk management?

A potential occurrence or event that could exploit a vulnerability and cause harm.

A weakness or a flaw in a system, a process, or a piece of code that can potentially be exploited by an attacker

A type of vulnerability

A potential impact of exploiting a vulnerability, causing harm to an organization, individual, or asset.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In the context of information security, a vulnerability is:

A potential threat

A weakness that can be exploited

A type of attack

An organizational policy

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a type of risk control strategy?

Mitigation

Acceptance

Transfer

Ignore

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a step in the risk management process?

Risk identification

Risk avoidance

Risk assessment

Risk control

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the first step in risk management?

Risk assessment

Risk control

Risk identification

Risk mitigation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?