5. Which of the following best describes residual risk?
A) Risk that remains after implementing controls
B) Risk that has been completely eliminated
C) Risk that is transferred to a third party
D) The initial risk before controls are applied
Answer: A) Risk that remains after implementing controls
6. Which framework is commonly used for risk management?
A) COBIT
B) ITIL
C) NIST 800-30
D) CMMI
Answer: C) NIST 800-30
7. What is the main goal of security governance?
A) Reduce the number of security incidents to zero
B) Align security efforts with business objectives
C) Ensure strict compliance with all regulations
D) Prevent all insider threats
Answer: B) Align security efforts with business objectives
8. What is the difference between a policy and a procedure in information
security?
A) A policy defines "what" must be done, while a procedure defines "how" to do it
B) Policies are only for executives, while procedures are for employees
C) Procedures are more important than policies
D) There is no difference between policies and procedures
Answer: A) A policy defines "what" must be done, while a procedure defines "how" to do it
9. Which of the following is an example of risk transference?
A) Encrypting sensitive data
B) Purchasing cybersecurity insurance
C) Implementing an intrusion detection system
D) Conducting a vulnerability assessment
Answer: B) Purchasing cybersecurity insurance
10. Which law regulates the protection of financial data in the United States?
A) GDPR
B) HIPAA
C) SOX
D) PCI DSS
Answer: C) SOX (Sarbanes-Oxley Act)