What is risk?
A. A type of computer
B. Exposure to danger, harm, or loss
C. A software program
D. A job title
B. Exposure to danger, harm, or loss
Which is an environmental threat?
A. Theft
B. Hurricane
C. Software bug
D. Employee mistake
B. Hurricane
Why is internet connectivity important?
A. For games only
B. For communication and data transfer
C. For printing
D. For typing
B. For communication and data transfer
What can happen if employees are not trained properly?
A. Faster work
B. System risks
C. No changes
D. Better security
B. System risks
Which SDLC model focuses on risk?
A. Waterfall
B. Spiral
C. Linear
D. Agile
B. Spiral
Which job is mentioned as dangerous?
A. Teacher
B. Fisher
C. Chef
D. Artist
B. Fisher
Which natural disaster cannot be avoided?
A. Dust
B. Flood
C. Maintenance delay
D. Training issues
B. Flood
What could happen if Amazon goes down for an hour?
A. Nothing
B. Gain money
C. Lose millions of dollars
D. Shut down forever
C. Lose millions of dollars
Why should employees have limited access?
A. To confuse them
B. To reduce risk
C. To slow work
D. To increase cost
B. To reduce risk
What is a common project risk?
A. Too much time
B. Going under budget
C. Missing deadlines
D. Too many computers
C. Missing deadlines
Why is risk important in IT?
A. IT has no risks
B. IT only has physical risks
C. IT has many non-physical risks
D. IT is always safe
C. IT has many non-physical risks
What is an example of a physical threat?
A. Earthquake
B. Theft
C. Software update
D. Email
B. Theft
What protects communication over the internet?
A. Printing
B. Encryption
C. Drawing
D. Typing
B. Encryption
Which software could affect human lives?
A. Games
B. Air traffic control systems
C. Music apps
D. Drawing tools
B. Air traffic control systems
What should happen after identifying a risk?
A. Ignore it
B. Classify its severity
C. Delete it
D. Hide it
B. Classify its severity
What must happen before minimizing risk?
A. Ignoring risks
B. Identifying risks
C. Deleting software
D. Hiring more workers
B. Identifying risks
What could damage equipment during transportation?
A. Rain only
B. Truck accidents
C. Emails
D. WiFi
B. Truck accidents
What does VoIP stand for?
A. Voice Over Internet Protocol
B. Video Over Internet Program
C. Value Of Internet Process
D. Voice On Internal Phone
A. Voice Over Internet Protocol
What is robustness in software?
A. How colorful it is
B. How strong and reliable it is
C. How fast it downloads
D. How cheap it is
B. How strong and reliable it is
What is a risk assessment document?
A. A game plan
B. A list of risks with severity and priority
C. A software tool
D. A schedule
B. A list of risks with severity and priority
What is a data center?
A. A school
B. A collection of servers
C. A phone
D. A store
B. A collection of servers
What is a site issue?
A. Virus
B. Power outage
C. Hacker
D. Flood
B. Power outage
What is a risk of using VoIP on public WiFi?
A. Faster calls
B. Eavesdropping
C. Better sound
D. Free service
B. Eavesdropping
What does SDLC stand for?
A. Software Development Life Cycle
B. System Data Link Code
C. Software Design Logic Control
D. System Development Learning Code
A. Software Development Life Cycle
What could happen if antivirus software is outdated?
A. Faster computer
B. Virus infection
C. Better security
D. No change
B. Virus infection