0% found this document useful (0 votes)
665 views

CS205 Quiz#1 24may2023 MIDS by MISS MEHWISH

This document discusses key concepts in information security. It provides examples of disruptive new technologies like cloud, mobile, IoT, and social media that pose security risks. It states that the effectiveness of technology cannot be maximized until people are trained on how to use it. Among options provided, security education is most relevant when trying to focus attention on security. The security posture in Pakistan can be improved by effective actions from regulators, organizations, and building an effective cybersecurity ecosystem. A business continuity plan is a document with critical information needed to continue operations during an unplanned event. Risk management involves ensuring the impact of threats exploiting vulnerabilities remains acceptable. One challenge with information security in Pakistan is that it is often misunderstood. Checklists should

Uploaded by

shahbaz shahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
665 views

CS205 Quiz#1 24may2023 MIDS by MISS MEHWISH

This document discusses key concepts in information security. It provides examples of disruptive new technologies like cloud, mobile, IoT, and social media that pose security risks. It states that the effectiveness of technology cannot be maximized until people are trained on how to use it. Among options provided, security education is most relevant when trying to focus attention on security. The security posture in Pakistan can be improved by effective actions from regulators, organizations, and building an effective cybersecurity ecosystem. A business continuity plan is a document with critical information needed to continue operations during an unplanned event. Risk management involves ensuring the impact of threats exploiting vulnerabilities remains acceptable. One challenge with information security in Pakistan is that it is often misunderstood. Checklists should

Uploaded by

shahbaz shahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

File by MAM MEHWISH 03184148783

Paid LMS HAndling Available

1. Cloud, mobile, IoT, and social are examples of____________.

a) Disruptive new technology frontiers that is secure and safe

b) Malware vectors

c) Disruptive new technology frontiers that pose security risks

d) Security attack entry points

Correct option: c) Disruptive new technology frontiers that pose security risks

2. The effectiveness of technology cannot be maximized until___________________.

a) Security guidelines are documented

b) People are trained on how to use the technology

c) Competent experts are hired to run the process

d) SOP is developed detailing the actions to be taken

Correct option: b) People are trained on how to use the technology

3. Which of the following programs is relevant when we are simply trying to "focus attention on
security"?

a) A degree program

b) Security education

c) Security training

Correct option: b) Security education

4. The security posture in Pakistan can be improved by____________.

a) More awareness and training

File by MAM MEHWISH 03184148783


Paid LMS HAndling Available
File by MAM MEHWISH 03184148783
Paid LMS HAndling Available

b) Effective actions taken by regulators, organizations, and building an effective cybersecurity


ecosystem

c) Learning from regional countries

d) Regular technical security audits

Correct option: b) Effective actions taken by regulators, organizations, and building an effective
cybersecurity ecosystem

5. What is a business continuity plan (BCP)?

a) A document that consists of critical information an organization needs to continue operating during
an unplanned event

b) An area of security that allows an organization to quickly resume mission-critical (IT) functions
following a disaster

c) A documented structured approach to deal with unplanned incidents

d) Plan of action which ensures regular business will continue even during a disaster

Correct option: a) A document that consists of critical information an organization needs to continue
operating during an unplanned event

6. As per ISACA, risk___________________________.

a) A necessary part of the business

b) Usually accomplished by ensuring that the impact of threats exploiting vulnerabilities is within
acceptable limits at an acceptable cost

c) A complex concept which only senior management should address at the board level

d) Should be eliminated altogether for best security implementation

Correct option: b) Usually accomplished by ensuring that the impact of threats exploiting
vulnerabilities is within acceptable limits at an acceptable cost

7. One of the major challenges of information security in Pakistan is that it is_____________________.

File by MAM MEHWISH 03184148783


Paid LMS HAndling Available
File by MAM MEHWISH 03184148783
Paid LMS HAndling Available

a) Reactive and superficial

b) Not considered important

c) Not funded adequately

d) Misunderstood

Correct option: d) Misunderstood

8. Checklist of applicable security controls step includes?

a) Document controls in SOP

b) Make a checklist for progress tracking and share with IT teams

c) Research for applicable controls

Correct options: b) Make a checklist for progress tracking and share it with IT teams, and c) Research
for applicable controls

File by MAM MEHWISH 03184148783


Paid LMS HAndling Available

You might also like