You are on page 1of 6

Week 3 - How Do We Protect Information?

Cuestionario, 10 preguntas
10/10 puntos (100%)

¡Felicitaciones! ¡Aprobaste!

Pregunta 1
Correcto
1/1
Punto

1. Pregunta 1
Using certain types of unauthorized software may represent the _______ of risk.

Why

How

What

Correcto

Correct!

Pregunta 2
Correcto
1/1
Punto

2. Pregunta 2
Incorrectly configuring a file may represent the ______ of risk.

When

How

Correcto
Correct!

Why

Pregunta 3
Correcto
1/1
Punto

3. Pregunta 3
The _______ of risk deals with timing of events.

How

When

Correcto

Correct!

What

Pregunta 4
Correcto
1/1
Punto

4. Pregunta 4
The ____________ of risk looks at trusted vs untrusted networks.

Why

Where

Correcto
Correct!

What

Pregunta 5
Correcto
1/1
Punto

5. Pregunta 5
You may have this type of risk if people within your organization want to use unsanctioned software.

How

Why

Correcto

Correct!

What

Pregunta 6
Correcto
1/1
Punto

6. Pregunta 6
The _____ step of Risk Assessments deals with identifying controls that need to be placed on the information
system.

Select

Correcto

Correct!
Implement

Assess

Pregunta 7
Correcto
1/1
Punto

7. Pregunta 7
The _____ step of Risk Assessments deals with putting the selected controls in place.

Implement

Correcto

Correct!

Report

Assess

Pregunta 8
Correcto
1/1
Punto

8. Pregunta 8
The _____ step of Risk Assessments deals with understanding how to identify the risk first.

Select

Categorize

Correcto
Correct!

Assess

Pregunta 9
Correcto
1/1
Punto

9. Pregunta 9
The _____ step of Risk Assessments deals with making sure the implemented controls are actually working as
intended.

Implement

Assess

Correcto

Correct!

Categorize

Pregunta 10
Correcto
1/1
Punto

10. Pregunta 10
The _____ step of Risk Assessments deals with accepting or mitigating the risk.

Assess

Authorize

Correcto
Correct!

Categorize

You might also like