0%

What is the first step in a risk assessment?

Correct! Wrong!

Identifying assets helps determine what needs protection before analyzing threats and vulnerabilities.

What is a threat in cybersecurity?

Correct! Wrong!

A threat is any circumstance or event with the potential to cause harm to systems or data.

Which of the following is an example of a vulnerability?

Correct! Wrong!

A vulnerability is a weakness that can be exploited by a threat to cause harm.

What is the purpose of a risk matrix?

Correct! Wrong!

A risk matrix helps evaluate and prioritize risks based on their likelihood and impact.

How is risk calculated in cybersecurity?

Correct! Wrong!

Risk is typically calculated as a function of threat likelihood and impact severity.

Why is it important to classify assets?

Correct! Wrong!

Classifying assets helps prioritize protection based on sensitivity and importance.

Loading Questions...

What is a common risk mitigation strategy?

Correct! Wrong!

Risk mitigation involves reducing the likelihood or impact of a threat through controls or policies.

What is a zero-day vulnerability?

Correct! Wrong!

A zero-day vulnerability is a software flaw unknown to the vendor, with no fix available.

What is risk acceptance?

Correct! Wrong!

Risk acceptance means acknowledging a risk and deciding not to take any action, often when the cost of mitigation exceeds the potential impact.