Introduction to Cybersecurity for Business Week 3 - How Do We Protect Information? Quiz Answers

Introduction to Cybersecurity for Business Week 3 - How Do We Protect Information? Quiz Answers


In this article i am gone to share Introduction to Cybersecurity for Business Week 3 - How Do We Protect Information? Quiz Answers with you..

Introduction to Cybersecurity for Business 
Week 3 - How Do We Protect Information? Quiz Answers


Week 3 - How Do We Protect Information?


Question 1)
Using certain types of unauthorized software may represent the _______ of risk.

  • Why
  • What
  • How

Question 2)
Incorrectly configuring a file may represent the ______ of risk.

  • Why
  • How
  • When

Question 3)
The _______ of risk deals with timing of events.

  • How
  • What
  • When

Question 4)
The ____________ of risk looks at trusted vs untrusted networks.

  • Where
  • Why
  • What

Question 5)
You may have this type of risk if people within your organization want to use unsanctioned software.

  • Why
  • What
  • How

Question 6)
The _____ step of Risk Assessments deals with identifying controls that need to be placed on the information system.

  • Implement
  • Assess
  • Select

Question 7
The _____ step of Risk Assessments deals with putting the selected controls in place.

  • Report
  • Assess
  • Implement

Question 8)
The _____ step of Risk Assessments deals with understanding how to identify the risk first.

  • Assess
  • Categorize
  • Select

Question 9)
The _____ step of Risk Assessments deals with making sure the implemented controls are actually working as intended.

  • Assess
  • Categorize
  • Implement

Question 10)
The _____ step of Risk Assessments deals with accepting or mitigating the risk.

  • Authorize
  • Categorize
  • Assess





Post a Comment

0 Comments