In this article i am gone to share Introduction to Cybersecurity for Business Week 3 - How Do We Protect Information? Quiz Answers with you..
Introduction to Cybersecurity for Business
Week 3 - How Do We Protect Information? Quiz Answers
Week 3 - How Do We Protect Information?
Question 1)
Using certain types of unauthorized software may represent the _______ of risk.
- Why
- What
- How
Question 2)
Incorrectly configuring a file may represent the ______ of risk.
- Why
- How
- When
Question 3)
The _______ of risk deals with timing of events.
- How
- What
- When
Question 4)
The ____________ of risk looks at trusted vs untrusted networks.
- Where
- Why
- What
Question 5)
You may have this type of risk if people within your organization want to use unsanctioned software.
- Why
- What
- How
Question 6)
The _____ step of Risk Assessments deals with identifying controls that need to be placed on the information system.
- Implement
- Assess
- Select
Question 7
The _____ step of Risk Assessments deals with putting the selected controls in place.
- Report
- Assess
- Implement
Question 8)
The _____ step of Risk Assessments deals with understanding how to identify the risk first.
- Assess
- Categorize
- Select
Question 9)
The _____ step of Risk Assessments deals with making sure the implemented controls are actually working as intended.
- Assess
- Categorize
- Implement
Question 10)
The _____ step of Risk Assessments deals with accepting or mitigating the risk.
- Authorize
- Categorize
- Assess
0 Comments