I’m working on a Computer Science exercise and need support.
Question 1
A SWOT analysis begins with an evaluation of internal strengths and weaknesses.
|
True |
|
|
False |
Question 2
A successfully designed risk program provides management with the ability to do which of the following in regard to risk? Select all that apply.
|
A |
Analyze risk |
|
B |
Condense risk |
|
C |
Regulate risk |
|
D |
Define risk |
|
E |
Evaluate risk |
|
F |
Respond to risk |
|
G |
Desensitize risk |
Question 3
What is the value of predictive risk information? Select one:
|
A |
Informed predictions |
|
B |
Increased wealth |
|
C |
Informed decisions |
|
D |
Increased alignment |
Question 4
Which of the following do cybersecurity experts believe to be some of the most significant dangers to security in the next few years? Select all that apply:
|
A |
Online commerce |
|
B |
Financing |
|
C |
Medical data |
|
D |
Mobile computing |
|
E |
Social media |
Question 5
Which of the following types of crimeware is designed and used to block access to computer systems until a sum of money is paid? Select one.
|
A |
Malware |
|
B |
Ransomware |
|
C |
Adware |
|
D |
Spyware |
Question 6
During what step of the risk management process do companies assess their highest ranked risks in order to develop a plan using risk controls? Select one.
|
A |
Risk identification |
|
B |
Risk mitigation |
|
C |
Risk monitoring |
|
D |
Risk evaluation |
|
E |
Risk analysis |
Question 7
Creating a good strategic IT plan involves understanding an organization’s business environment.
|
True |
|
|
False |
Question 8
System vulnerability refers to which of the following? Select one.
|
A |
A gap in IT governance |
|
B |
A gap in IT security defense |
|
C |
A breach in data |
|
D |
A breach in stakeholder trust |
Question 9
There are international, federal, and state laws and industry regulations that are mandated to specifically address cyber attacks.
|
True |
|
|
False |
Question 10
Which of the following are objectives of IT strategic plans? Select all that apply.
|
A |
Suggest improvements about current performance |
|
B |
Identify capacity and human resource requirements |
|
C |
Identify potential IT system investors |
|
D |
Improve communication between systems |
|
E |
Improve management’s understanding of IT opportunities and limitations |


0 comments