You are on page 1of 3

Module 2: Quiz: Attempt review | IT Masters Short Courses https://learn.itmasters.edu.au/mod/quiz/review.php?

attempt=411599&cmid=3907

State Finished

Time taken 1 min 32 secs

Question 1 Compliance to industry standards and government regulation should be considered:


Correct

Marked out of Select one:


1.00
a. as the ultimate security risk.

b. a mandatory organisational requirement.

c. as the number one priority for the security strategy.

d. as a risk management decision.

1 of 3 28-12-2023, 20:14
Module 2: Quiz: Attempt review | IT Masters Short Courses https://learn.itmasters.edu.au/mod/quiz/review.php?attempt=411599&cmid=3907

Question 2 Why is information classification an essential step in protection information within an organisation?
Correct

Marked out of Select one:


1.00
a. Because all information handled by the business is owned by the business.

b. Because it allows an organisation to set information handling standards.

c. Because information cannot be recovered if destroyed.

d. Because information classification is a regulatory requirement.

Question 3 What is the PRIMARY purpose of a risk assessment?


Correct

Marked out of Select one:


1.00
a. To understand the missing PCI DSS controls.

b. To determine the current level of risk present within the scope of the assessment.

c. To force management to implement best practices and deploy security solutions.

d. To raise awareness across the organisation of information security incidents.

2 of 3 28-12-2023, 20:14
Module 2: Quiz: Attempt review | IT Masters Short Courses https://learn.itmasters.edu.au/mod/quiz/review.php?attempt=411599&cmid=3907

Question 4 What are the two crucial elements used to assess the level of risk?
Correct

Marked out of Select one:


1.00
a. Likelihood and impact

b. Business continuity and disaster recovery

c. Threat and actor

d. Quantitative and qualitative

Question 5 What is the PRIMARY purpose of risk management?


Correct

Marked out of Select one:


1.00
a. Obtain a zero-risk posture.

b. Build a case for a larger information security budget.

c. Achieve an acceptable level of risk.

d. Provide a pathway to escalate risks that don’t align with best practice.

3 of 3 28-12-2023, 20:14

You might also like