
Information Assurance and Security Final Term Quiz 1
Authored by LODELIO MILLO
Computers
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What term describes the potential for loss or damage when a threat exploits a vulnerability?
Impact
Weakness
Risk
Threat
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
When assessing risk, what does 'asset value' refer to?
Cost of the asset
Importance of the asset to the organization
Market price of the asset
Depreciation of the asset
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does the term 'threat' mean in risk management?
A potential occurrence or event that could exploit a vulnerability and cause harm.
A weakness or a flaw in a system, a process, or a piece of code that can potentially be exploited by an attacker
A type of vulnerability
A potential impact of exploiting a vulnerability, causing harm to an organization, individual, or asset.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In the context of information security, a vulnerability is:
A potential threat
A weakness that can be exploited
A type of attack
An organizational policy
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is NOT a type of risk control strategy?
Mitigation
Acceptance
Transfer
Ignore
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is NOT a step in the risk management process?
Risk identification
Risk avoidance
Risk assessment
Risk control
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the first step in risk management?
Risk assessment
Risk control
Risk identification
Risk mitigation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?