Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Free Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
When is it necessary to charge executives with negligence?
Correct
Heads are held to a specific norm and are required to act dependably when running and ensuring an organization. These guidelines and assumptions compare to the due consideration idea under the law. Due consideration intends to complete exercises that a sensible individual would be relied upon to do in a similar circumstance. In the event that a leader demonstrates flippantly in any way, she can be viewed as not rehearsing due mind and be held careless.
Incorrect
Heads are held to a specific norm and are required to act dependably when running and ensuring an organization. These guidelines and assumptions compare to the due consideration idea under the law. Due consideration intends to complete exercises that a sensible individual would be relied upon to do in a similar circumstance. In the event that a leader demonstrates flippantly in any way, she can be viewed as not rehearsing due mind and be held careless.
-
Question 2 of 10
2. Question
What steps have been taken by other legislative bodies in their approach to helping deal with cybercrime?
Correct
Ordinarily, what is tainted, bargained, or taken from a PC is information, so current laws have been refreshed to incorporate the assurance of immaterial resources, as in information. Throughout the long term, information and data have become numerous organizations’ most significant resource, which should be ensured by the laws.
Incorrect
Ordinarily, what is tainted, bargained, or taken from a PC is information, so current laws have been refreshed to incorporate the assurance of immaterial resources, as in information. Throughout the long term, information and data have become numerous organizations’ most significant resource, which should be ensured by the laws.
-
Question 3 of 10
3. Question
Which figure is the most vital thing when it comes to ensuring security is successful in an organization?
Correct
Without senior administration’s help, a security program won’t get important attention, funds, resources, and enforcement capabilities.
Incorrect
Without senior administration’s help, a security program won’t get important attention, funds, resources, and enforcement capabilities.
-
Question 4 of 10
4. Question
Which of the following standards would be most valuable to you in ensuring your information security administration framework takes follows industry best practices?
Correct
The ISO/IEC 27000 arrangement is the lone choice that tends to best practices across the broadness of an ISMS. COSO IC and NIST SP 800-53 both arrangement with controls, which are a basic yet by all account not the only segment of an ISMS.
Incorrect
The ISO/IEC 27000 arrangement is the lone choice that tends to best practices across the broadness of an ISMS. COSO IC and NIST SP 800-53 both arrangement with controls, which are a basic yet by all account not the only segment of an ISMS.
-
Question 5 of 10
5. Question
Which of the following is true around data breaches?
Correct
Associations encountering an information break might be needed by-laws or guidelines to take certain activities. For example, numerous nations have revelation prerequisites that require warning to influenced parties and additionally administrative bodies inside a particular time period.
Incorrect
Associations encountering an information break might be needed by-laws or guidelines to take certain activities. For example, numerous nations have revelation prerequisites that require warning to influenced parties and additionally administrative bodies inside a particular time period.
-
Question 6 of 10
6. Question
When is it satisfactory to not take action on an identified risk?
Correct
Organizations may choose to live with explicit dangers they are confronted with if the expense of attempting to ensure themselves would be more prominent than the expected misfortune if the danger were to turn out to be genuine. Countermeasures are normally unpredictable to a certain extent, and there are quite often policy centered issues encompassing various dangers, yet these are not motivations to not execute a countermeasure.
Incorrect
Organizations may choose to live with explicit dangers they are confronted with if the expense of attempting to ensure themselves would be more prominent than the expected misfortune if the danger were to turn out to be genuine. Countermeasures are normally unpredictable to a certain extent, and there are quite often policy centered issues encompassing various dangers, yet these are not motivations to not execute a countermeasure.
-
Question 7 of 10
7. Question
Which is the most important technique when deciding in the event that a specific security control should be implemented?
Correct
Despite the fact that different answers may appear to be right, B is the most intelligent answer here. This is on the grounds that a danger investigation is performed to distinguish the dangers and concoct proposed countermeasures. The ALE tells the organization the amount it could lose if a particular danger turned out to be genuine. The Lager worth will go into the cost/advantage examination, however, the ALE doesn’t address the expense of the countermeasure and the advantage of a countermeasure.
Incorrect
Despite the fact that different answers may appear to be right, B is the most intelligent answer here. This is on the grounds that a danger investigation is performed to distinguish the dangers and concoct proposed countermeasures. The ALE tells the organization the amount it could lose if a particular danger turned out to be genuine. The Lager worth will go into the cost/advantage examination, however, the ALE doesn’t address the expense of the countermeasure and the advantage of a countermeasure.
-
Question 8 of 10
8. Question
Which best describes the reason for the ALE calculation?
Correct
The ALE figuring gauges the potential misfortune that can influence one resource from a particular danger inside a one-year stretch of time. This worth is utilized to sort out the measure of cash that ought to be reserved to shield this resource from this danger.
Incorrect
The ALE figuring gauges the potential misfortune that can influence one resource from a particular danger inside a one-year stretch of time. This worth is utilized to sort out the measure of cash that ought to be reserved to shield this resource from this danger.
-
Question 9 of 10
9. Question
How do you do the residual risk calculation?
Correct
More mathematical than realistic, the equation is. It is difficult for a number to be assigned to an
Individual weakness or menace. This equation helps you to look at the possible loss of
A particular asset, as well as the gap in controls (which is unlikely for the specific countermeasure) Protecting against). The residual risk, which is what is left over after a risk, is what remains. Countermeasures are in effect.Incorrect
More mathematical than realistic, the equation is. It is difficult for a number to be assigned to an
Individual weakness or menace. This equation helps you to look at the possible loss of
A particular asset, as well as the gap in controls (which is unlikely for the specific countermeasure) Protecting against). The residual risk, which is what is left over after a risk, is what remains. Countermeasures are in effect. -
Question 10 of 10
10. Question
Why should the team that will perform and survey the chance analysis data be made up of people in different departments?
Correct
An appraisal is just as good as the knowledge that goes into it. Data relating to the risks facing the company should be extracted from individuals who better understand the company’s business functions and environment. Each department is aware of its own threats and resources and may have solutions to unique threats affecting its part of the business.
Incorrect
An appraisal is just as good as the knowledge that goes into it. Data relating to the risks facing the company should be extracted from individuals who better understand the company’s business functions and environment. Each department is aware of its own threats and resources and may have solutions to unique threats affecting its part of the business.