Information Security Quiz

Information Security Quiz

University

20 Qs

quiz-placeholder

Similar activities

DPMQ2

DPMQ2

University

15 Qs

Information Technology Quiz

Information Technology Quiz

University

20 Qs

Activity - Task Completion and Safety

Activity - Task Completion and Safety

9th Grade - University

20 Qs

ICYS5112 LU1 Quiz

ICYS5112 LU1 Quiz

University

15 Qs

PRELIM QUIZ NO. 2

PRELIM QUIZ NO. 2

University

19 Qs

post-test

post-test

University

17 Qs

FHCT1012 Computing Technology Sample MIdterm questions

FHCT1012 Computing Technology Sample MIdterm questions

University

15 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Edward Adu

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines "risk" in the context of information security?

The likelihood that a threat will occur regardless of vulnerabilities

The potential for loss or damage when a threat exploits a vulnerability

The vulnerability of an asset to any external threat

The total number of threats identified in an organization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During risk identification, which of the following is NOT typically considered an asset?

Software applications

Employee personal opinions

Hardware devices

Organizational data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most accurate description of a vulnerability?

A threat actor targeting an organization

A weakness that can be exploited by a threat

A security control implemented to reduce risk

An event causing damage to an asset

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In risk assessment, what is the primary purpose of prioritizing risks as High, Medium, or Low?

To categorize assets by value

To determine the order in which risks should be mitigated

To decide which threats to ignore

To classify vulnerabilities by severity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a detective control?

Firewall

Intrusion Detection System (IDS)

Regular data backups

Strong password policies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key difference between risk acceptance and risk avoidance?

Acceptance involves transferring risk to a third party, avoidance does not

Acceptance means no action is taken to mitigate risk, avoidance means eliminating the risk source

Acceptance requires implementing corrective controls, avoidance requires preventive controls

Acceptance is used only for low risks, avoidance only for high risks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security policy is primarily concerned with defining acceptable behavior for system users?

Data Protection Policy

Acceptable Use Policy

Password Policy

Incident Response Policy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?