0%

Which of the following is a key objective of security risk management?

Correct! Wrong!

Understanding the objective helps professionals focus on minimizing harm and ensuring safety.

What is the first step in conducting a threat assessment?

Correct! Wrong!

Initial identification lays the foundation for a comprehensive analysis of risks.

Which term describes the likelihood that a threat will exploit a vulnerability?

Correct! Wrong!

This term is critical in determining the overall risk level in security planning.

What is the purpose of a vulnerability assessment?

Correct! Wrong!

A vulnerability assessment helps prioritize areas that require security improvements.

What is an example of a physical security control?

Correct! Wrong!

Physical controls are tangible barriers used to prevent unauthorized access.

Which element is NOT part of the risk assessment process?

Correct! Wrong!

Excluding irrelevant steps is important for conducting efficient risk assessments.

Loading Questions...

What does CPTED stand for in threat assessment?

Correct! Wrong!

CPTED principles guide the design of environments to reduce criminal behavior.

What role does access control play in risk management?

Correct! Wrong!

Access control limits who can enter or use a resource, reducing risk.

Which of the following best defines 'residual risk'?

Correct! Wrong!

Residual risk refers to what remains even after all mitigation strategies are applied.