Application of IT Security

Application of IT Security

Professional Development

50 Qs

quiz-placeholder

Similar activities

MEF SDWAN Mock Exam

MEF SDWAN Mock Exam

Professional Development

50 Qs

F5 - NCS - MOCK

F5 - NCS - MOCK

Professional Development

50 Qs

TKK TI

TKK TI

Professional Development

50 Qs

Comercio Electronico

Comercio Electronico

Professional Development

47 Qs

Yø Yø

Yø Yø

Professional Development

55 Qs

NETWORK HARDWARE

NETWORK HARDWARE

University - Professional Development

55 Qs

LEGO Postest S2

LEGO Postest S2

Professional Development

50 Qs

Application of IT Security

Application of IT Security

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

25B30 Instructors

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are examples of assets in an organization?

Buildings

Data

Attackers

Recipes

Vulnerabilities

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements about vulnerabilities are true? (Select all that apply)

Vulnerabilities are weaknesses or absences of countermeasures.

Vulnerabilities can be found in personnel.

Unrestricted access to a folder on a computer is an example of a vulnerability.

Vulnerabilities always lead to immediate threats.

Vulnerability assessments are used to identify vulnerabilities.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Regarding threats and threat agents, which statements are correct? (Select all that apply)

A threat happens only when a vulnerability is exploited.

A threat agent can be an attacker who exploits a vulnerability.

Not all threat agents will exploit vulnerabilities.

A threat agent is the same as a vulnerability.

Threat agents carry out threats but cannot discover vulnerabilities.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

According to NIST SP 800-30, which of the following are common information-gathering techniques used in risk analysis?

Automated risk assessment tools

Interviews

Social media monitoring

Questionnaires

Policy document reviews

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple sources should be used to determine the risks to a single asset during risk analysis.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What two factors combine to determine risk in the risk management process?

Threat and asset value

Likelihood and impact

Vulnerability and threat agent

Asset value and vulnerability

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Hackers typically hack for which of the following reasons?

Financial gain

Disruption

Geopolitical change

Notoriety

Environmental protection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?