Créer une activité
Jouer Test
1. 
On which digital incidents are based?
A.
Is a malicious software, designed to harm or make unlawful use of the information systems of organizations
B.
USD 97 billion
C.
was the strengthening of the institutionality in the subject
D.
is the world's leading organization and recognized leader in response to digital incidents
2. 
What is the ICT indicator for the cloud market in 2015?
A.
USD 97 billion
B.
is a malicious software, designed to harm or make unlawful use of the information systems of organizations
C.
Now
D.
Yes
3. 
What was the main achievement achieved by the cybersecurity and cyber defense policy
A.
was the strengthening of the institutionality in the subject
B.
95000
C.
is the world's leading organization and recognized leader in response to digital incidents
D.
Yes
4. 
What international regulations are about
A.
Adopts legislation that facilitates the prevention of criminal behavior you go and contribute and with efficient tools in criminal matters that allow detecting
B.
Is the world's leading organization and recognized leader in response to digital incidents
C.
USD 97 billion
D.
The risk management strategy to address digital security should have a flexible and agile approach to address digital uncertainties
E.
Adopts legislation that facilitates the prevention of criminal behavior you go and contribute and with efficient tools in criminal matters that allow detecting
F.
Is the world's leading organization and recognized leader in response to digital incidents
5. 
What is the FIRS?
A.
Is the world's leading organization and recognized leader in response to digital incidents
B.
The risk management strategy to address digital security should have a flexible and agile approach to address digital uncertainties
C.
USD 97 billion
D.
Now
6. 
What is digital security risk management
A.
It is the set of coordinated activities within an organization or between organizations, to address the risk of digital security, while maximizing opportunities
B.
It is the set of coordinated activities within an organization or between organizations, to address the risk of digital security, while maximizing opportunities
C.
Was the strengthening of the institutionality in the subject
D.
The risk management strategy to address digital security should have a flexible and agile approach to address digital uncertainties
7. 
What the risk assessment and treatment cycle is about
A.
Risk assessment must be carried out in a systematic and continuous way, evaluating the possible consequences of threats and digital vulnerabilities in the conomic and social activities at stake
B.
It is the set of coordinated activities within an organization or between organizations, to address the risk of digital security, while maximizing opportunities.
C.
Is the world's leading organization and recognized leader in response to digital incidents
D.
USD 97 billion
8. 
What are the risks in the conpes
A.
It is the effect of uncertainties on objectives and can result from events where cyber threats combine with vulnerabilities generating economic consequences
B.
Leaders and decision makers must ensure that security measures are appropriate and proportionate to the risk, and must take into account their potential negative or positive impact on economic and social activities that are intended to protect
C.
Is the world's leading organization and recognized leader in response to digital incidents
D.
USD 97 billion
9. 
What are the security measures
A.
Leaders and decision makers must ensure that security measures are appropriate and proportionate to the risk, and must take into account their potential negative or positive impact on economic and social activities that are intended to protect
B.
Adopts legislation that facilitates the prevention of criminal behavior you go and contribute and with efficient tools in criminal matters that allow detecting
C.
Is the world's leading organization and recognized leader in response to digital incidents
D.
USD 97 billion
10. 
What the digital security risk management strategy is about
A.
The risk management strategy to address digital security should have a flexible and agile approach to address digital uncertainties
B.
Leaders and decision makers must ensure that security measures are appropriate and proportionate to the risk, and must take into account their potential negative or positive impact on economic and social activities that are intended to protect
C.
Risk assessment must be carried out in a systematic and continuous way, evaluating the possible consequences of threats and digital vulnerabilities in the conomic and social activities at stake
D.
Yes