1
2
3
4
5
100

What is risk?

A. A type of computer
B. Exposure to danger, harm, or loss
C. A software program
D. A job title

B. Exposure to danger, harm, or loss

100

Which is an environmental threat?

A. Theft
B. Hurricane
C. Software bug
D. Employee mistake

B. Hurricane

100

Why is internet connectivity important?

A. For games only
B. For communication and data transfer
C. For printing
D. For typing

B. For communication and data transfer

100

What can happen if employees are not trained properly?

A. Faster work
B. System risks
C. No changes
D. Better security

B. System risks

100

Which SDLC model focuses on risk?

A. Waterfall
B. Spiral
C. Linear
D. Agile

B. Spiral

200

Which job is mentioned as dangerous?

A. Teacher
B. Fisher
C. Chef
D. Artist

B. Fisher

200

Which natural disaster cannot be avoided?

A. Dust
B. Flood
C. Maintenance delay
D. Training issues

B. Flood

200

What could happen if Amazon goes down for an hour?

A. Nothing
B. Gain money
C. Lose millions of dollars
D. Shut down forever

C. Lose millions of dollars

200

Why should employees have limited access?

A. To confuse them
B. To reduce risk
C. To slow work
D. To increase cost

B. To reduce risk

200

What is a common project risk?

A. Too much time
B. Going under budget
C. Missing deadlines
D. Too many computers

C. Missing deadlines

300

Why is risk important in IT?

A. IT has no risks
B. IT only has physical risks
C. IT has many non-physical risks
D. IT is always safe

C. IT has many non-physical risks

300

What is an example of a physical threat?

A. Earthquake
B. Theft
C. Software update
D. Email

B. Theft

300

What protects communication over the internet?

A. Printing
B. Encryption
C. Drawing
D. Typing

B. Encryption

300

Which software could affect human lives?

A. Games
B. Air traffic control systems
C. Music apps
D. Drawing tools

B. Air traffic control systems

300

What should happen after identifying a risk?

A. Ignore it
B. Classify its severity
C. Delete it
D. Hide it

B. Classify its severity

400

What must happen before minimizing risk?

A. Ignoring risks
B. Identifying risks
C. Deleting software
D. Hiring more workers

B. Identifying risks

400

What could damage equipment during transportation?

A. Rain only
B. Truck accidents
C. Emails
D. WiFi

B. Truck accidents

400

What does VoIP stand for?

A. Voice Over Internet Protocol
B. Video Over Internet Program
C. Value Of Internet Process
D. Voice On Internal Phone

A. Voice Over Internet Protocol

400

What is robustness in software?

A. How colorful it is
B. How strong and reliable it is
C. How fast it downloads
D. How cheap it is

B. How strong and reliable it is

400

What is a risk assessment document?

A. A game plan
B. A list of risks with severity and priority
C. A software tool
D. A schedule

B. A list of risks with severity and priority

500

What is a data center?

A. A school
B. A collection of servers
C. A phone
D. A store

B. A collection of servers

500

What is a site issue?

A. Virus
B. Power outage
C. Hacker
D. Flood

B. Power outage

500

What is a risk of using VoIP on public WiFi?

A. Faster calls
B. Eavesdropping
C. Better sound
D. Free service

B. Eavesdropping

500

What does SDLC stand for?

A. Software Development Life Cycle
B. System Data Link Code
C. Software Design Logic Control
D. System Development Learning Code

A. Software Development Life Cycle

500

What could happen if antivirus software is outdated?

A. Faster computer
B. Virus infection
C. Better security
D. No change

B. Virus infection

M
e
n
u