Internship Practice Quiz
Internship Practice Quiz
True or False: Residual risk is the risk that remains after an organization has implemented
risk mitigation measures.
A) TRUE
B) FALSE
Question 2 of 45 Course 2
Question 3 of 45 SOC 2
True or False: SOC 2 Type 2 reports are intended solely for internal use within an
organization.
A) TRUE
B) FALSE
Question 4 of 45 Terminology
Who can sign reports for their company based on the training they undergo?
A) ISO 27002
B) ISO 27000
C) ISO 27004
D) ISO 27001
What risks does an organization face when outsourcing data management to third-party
vendors?
A) No risks at all
B) Operational, legal, regulatory, compliance, reputational, financial, and strategic risks
C) Risks limited to operational disruptions
D) Only financial risks
True or False: ISO is an international standard, whereas NIST is only recognized in the
United States.
A) TRUE
B) FALSE
Question 10 of 45 GDPR
True or False: GDPR applies only to organizations based in the European Union (EU).
A) TRUE
B) FALSE
Question 11 of 45 GDPR
Under GDPR, what rights do data subjects (individuals) have regarding their personal data?
Question 12 of 45 Internship
Please provide a hypothetical example where you worked with an organization or a client to
implement a risk reduction control or remediation.
A) TRUE
B) FALSE
True or False: It is strongly recommended to apply strong cryptography both at the data level
and the session level during the transmission of PAN over open networks, as per
Requirement 4.2.
A) TRUE
B) FALSE
Which of the following is NOT considered a valid authentication factor in PCI DSS?
A) Independent
B) Information
C) International
D) Institute
Question 17 of 45 Terminology
Question 18 of 45 GRC
True or False: An organization's risk appetite represents the amount of risk it is willing to
tolerate.
A) TRUE
B) FALSE
Which section of a policy typically outlines the consequences or penalties for non-
compliance?
A) Introduction
B) Enforcement
C) Definitions
D) Purpose
Question 20 of 45 Generic
Question 23 of 45 Frameworks
Question 24 of 45 Generic
When reviewing user access rights for compliance with PCI DSS (Payment Card Industry
Data Security Standard), which practice ensures adherence to the requirements?
Question 26 of 45 GRC
Question 27 of 45 Auditing
What information is typically excluded in the final compliance audit report to management?
Question 28 of 45 Internship
Provide me a scenario of you being the first responder to a data breach. What steps would
you take to mitigate, transfer, accept or avoid this risk:
Question 29 of 45 Risk Management
How do risks, threats, and vulnerabilities impact each other within the context of
cybersecurity?
A) Risks are potential security incidents, threats are weaknesses in a system, and
vulnerabilities are external factors that can exploit these weaknesses.
B) Risks are external factors that can exploit vulnerabilities, threats are potential
consequences of these exploits, and vulnerabilities are the security controls in place.
C) Risks are the potential harm or loss an organization faces, threats are the actions or
events that can cause harm, and vulnerabilities are weaknesses that can be
exploited by threats.
D) Risks, threats, and vulnerabilities are unrelated and do not impact each other in the
cybersecurity field.
Question 30 of 45 Scope
What is the primary benefit of implementing network segmentation in the context of PCI DSS
compliance, specifically in relation to reducing the workload and costs associated with the
PCI DSS assessment process?
To ensure that malicious software is prevented and addressed, what must an organization
do?
Which of the following is NOT a typical component of a penetration test scope in PCI DSS?
A) Internal pentests
B) External pentests
C) Web application development
D) Segmentation pentests
Question 33 of 45 Auditing
In a compliance audit, what is the primary purpose of a request for evidence (RFE)?
A) Once a decade
B) Only when requested by employees
C) Whenever a major organizational change occurs
D) Never, policies should remain static
Question 35 of 45 Intro
What organization administers and manages the Payment Card Industry Data Security
Standard (PCI DSS)?
How does risk management contribute to the overall success of a project or organization?
In the context of PCI DSS, what determines cardholder data retention periods?
Question 38 of 45 NIST
Question 39 of 45 GRC
Which requirement of the PCI DSS involves protecting cardholder data with strong
cryptography during transmission over open, public networks?
A) Requirement 4.0
B) Requirement 1.0
C) Requirement 2.0
D) Requirement 5.0
True or False: Risk mitigation is a risk response strategy that involves accepting the potential
consequences of a risk without taking any action to prevent or reduce its impact.
A) TRUE
B) FALSE
Question 42 of 45 SOC 2
Question 43 of 45 NIST
True or False: NIST SP 800-53 provides guidelines for securing information systems and
data, but it does not cover privacy controls.
A) TRUE
B) FALSE
Question 44 of 45 Scope
True or False: Use of a PCI DSS compliant Third-Party Service Provider (TPSP)
automatically makes the customer PCI DSS compliant.
A) TRUE
B) FALSE
Question 45 of 45 Internship
How would you conduct an Audit: (Pick one out of HIPAA, PCI, ISO, SOC) (Pick one of out
External and Internal):