ASSESSMENT
COMPREHENSIVE
QUESTIONS AND CORRECT
ANSWERS GRADED A+
[Document subtitle]
[DATE]
[COMPANY NAME]
[Company address]
, Contact for further consultation
1. is the probability of a threat agent exploiting a vulnerability
and the associated impact. (Note Answer: Remember that a threat
agent is defined as an entity that can exploit a vulnerability, and
vulnerability is defined as a weakness or lack of countermeasures.)
a-Risk
policy b-
Risk
c-Incident
d-Attack Answer: (b) Risk
2. Risks like hacking, cracking and attacking can be grouped into
which one of the following categories?
a-Equipment
malfunction b-
Application error
c- Misuse of data
d- Inside and outside attack
e- Loss of data Answer: (d) Inside and outside attack
3. True/False Sharing trade secrets, fraud, espionage, and theft are
risks that are grouped under "Loss of data"? Answer: False; Sharing trade secrets,
fraud, espionage, and theft are risks that are grouped under "Misuse of data"
4. is a set of ideas to be implemented in order to
minimize and mitigate risks faced by an organization?
a- User access policy
2/
19
, Contact for further consultation
b- Risk policy
c- Security policy
d- Security control
e- None of these options Answer: (b) Risk policy; is a set of ideas to be implemented in
order to minimize and mitigate risks faced by an organization.
5. Which of the following issues are included in risk policy?
a- Procedures for employees under training who are authorized to
access the system
b- All of these options
c- The computer system's rules of behavior and the consequences of
violating
3/
19