3.12_Risk_&_Vulnerability_Management

3.12_Risk_&_Vulnerability_Management

Professional Development

10 Qs

quiz-placeholder

Similar activities

#02 Incident Response, BC, and DR Concepts

#02 Incident Response, BC, and DR Concepts

Professional Development

10 Qs

Security+ Study Guide-10 Understanding Cryptography and PKI

Security+ Study Guide-10 Understanding Cryptography and PKI

Professional Development

15 Qs

Coding & Logic - Lesson 1

Coding & Logic - Lesson 1

Professional Development

15 Qs

Telco Practice Test 1

Telco Practice Test 1

Professional Development

15 Qs

Computer security quiz, Knowbe4

Computer security quiz, Knowbe4

Professional Development

12 Qs

AI Cybersecurity Quiz

AI Cybersecurity Quiz

Professional Development

15 Qs

Cybersecurity training - Cryptography 2

Cybersecurity training - Cryptography 2

Professional Development

13 Qs

Mobile Application Security

Mobile Application Security

Professional Development

8 Qs

3.12_Risk_&_Vulnerability_Management

3.12_Risk_&_Vulnerability_Management

Assessment

Quiz

Computers

Professional Development

Hard

Created by

SHUSHANT TRIPATHI

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following items are prerequisites for risk to exist? (Choose three.)

A vulnerability

A Threat

A person

An asset

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following can be vulnerabilities? (Choose three.)

The location of a building

Misconfigured systems

Unpatched systems

Disgruntled former employees

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following controls protects data in motion?

File system permissions

Full disk encryption

Protocol encryption

Process isolation

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two inputs does qualitative risk analysis use? (Choose two.)

Asset value

Likelihood

Exposure factor

Impact

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which steps are generally conducted in preparation for vulnerability assessments? (Choose two.)

Applying remediations

Prioritization of assets

Discovery of the devices on our networks

Verification that remediations are working properly

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of detective controls? (Choose two.)

Security camera

Firewall

IDS

Disk encryption

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two components are multiplied in quantitative risk analysis? (Choose two.)

Likelihood

Single loss expectancy (SLE)

Impact

Annualized rate of occurrence (ARO)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?