EY + GRC + Auditing + IT + Cybersecurity Quiz

EY + GRC + Auditing + IT + Cybersecurity Quiz

University

56 Qs

quiz-placeholder

Similar activities

Domain 2 - Network Security

Domain 2 - Network Security

10th Grade - University

55 Qs

System Analysis and Design - Midterm (BSIT 3)

System Analysis and Design - Midterm (BSIT 3)

University

60 Qs

F1 Bengkel Pecutan SC015

F1 Bengkel Pecutan SC015

University

53 Qs

601

601

12th Grade - University

61 Qs

Q-Round-1

Q-Round-1

University

60 Qs

The Big Digital IT & General Knowledge Quiz

The Big Digital IT & General Knowledge Quiz

9th Grade - University

59 Qs

Safety and Security - Easy

Safety and Security - Easy

7th Grade - University

57 Qs

CISSP 7th ed PT2

CISSP 7th ed PT2

KG - University

60 Qs

EY + GRC + Auditing + IT + Cybersecurity Quiz

EY + GRC + Auditing + IT + Cybersecurity Quiz

Assessment

Quiz

Computers

University

Medium

Created by

dharmendhar singh

Used 1+ times

FREE Resource

56 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which of the following best describes the purpose of GRC?

Increase sales and revenue

Align IT with business goals, manage risks, ensure compliance

Reduce hardware costs

Automate HR operations

2.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

In risk management, which is NOT a risk response strategy?

Avoidance

Mitigation

Acceptance

Duplication

3.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which framework is commonly used for IT governance?

ISO 9001

COBIT

CMMI

PMBOK

4.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which is an example of compliance risk?

Competitor gaining market share

Employee fraud

Violation of GDPR data protection rules

System downtime

5.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

The “Three Lines of Defense” model in GRC includes all EXCEPT:

Operational Management

Risk & Compliance Functions

Internal Audit

External Customers

6.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Which law/regulation primarily deals with protecting health data?

HIPAA

SOX

GDPR

PCI-DSS

7.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

In risk assessment, the formula for risk is typically:

Risk = Threat ÷ Vulnerability

Risk = Likelihood × Impact

Risk = Asset + Control

Risk = Compliance × Policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?