Risk Management And Security Controls Quiz
True / False
True / False
True / False
Select all that apply
Put in order
True / False
Select all that apply
Select all that apply
Select all that apply
Disclaimer
This quiz is for educational purposes only. It does not replace official safety training, certification, or regulatory compliance programs.
Frequent Errors in Risk Management and Security Control Decisions
Relying on informal risk identification
Many practitioners skip structured techniques such as task analysis, job hazard analysis, and incident trend review. Hazards, cyber threats, and process deviations remain undocumented. To avoid this, maintain a written risk register tied to OSHA and NFPA obligations and update it after inspections, near misses, and change management reviews.
Confusing security control types
People often mislabel administrative, technical, and physical controls or mix preventive, detective, and corrective functions. For example, CCTV is treated as preventive instead of detective. During the quiz, first ask what the control actually does, then assign both its layer and purpose. This reduces errors on questions about control categorization.
Ignoring the hierarchy of controls
A common mistake is jumping straight to PPE or monitoring tools while leaving higher order controls untouched. Candidates underestimate elimination, substitution, and engineering controls in risk reduction. In scenario questions, prioritize removing or isolating the hazard before choosing administrative rules and PPE, consistent with OSHA and NFPA 70E expectations.
Assuming controls reduce risk to zero
Another frequent error is treating implemented controls as a guarantee that incidents cannot occur. Residual risk, risk acceptance, and periodic review are overlooked. For quiz items that ask what to do after controls are in place, think about verifying effectiveness, monitoring indicators, documenting residual risk, and scheduling formal reassessment.
Focusing on a single discipline
Some learners think only about cyber security or only about physical safety. Many controls span physical access, process safety, and information security. When a question references mixed environments such as industrial control systems, consider both safety outcomes and data protection, and select controls that address both where feasible.
Risk Management and Security Control Scenario Practice
Scenario 1: Access control gap in a warehouse
Your OSHA inspection notes show repeated incidents of unauthorized forklift use after hours. Doors are locked, but badges are shared and CCTV is rarely reviewed. Identify the primary risks, then select a combination of administrative, technical, and physical controls that are preventive and detective rather than relying solely on disciplinary action.
Scenario 2: NFPA 70E electrical maintenance task
An electrician must rack out a breaker in a live switchgear lineup. The existing control is PPE rated for the arc flash boundary. The arc flash study is five years old and equipment has changed. Decide which higher level controls to pursue first, how to reassess risk, and what to document before work proceeds.
Scenario 3: Phishing and social engineering surge
Your incident log shows multiple successful phishing attacks that bypassed email filtering. The security awareness course was completed six months ago. Evaluate the likelihood and impact, then determine which control types are weak. Consider technical filtering changes, administrative policies, and detective monitoring such as simulated phishing and log review.
Scenario 4: Chemical process modification
A new solvent is introduced into a mixing line, changing flash point and exposure risk. Existing controls cover only the previous chemical. Decide how to update the risk assessment, which engineering and administrative controls to modify, and how to document residual risk for management acceptance.
Scenario 5: Policy mapping for 5.4.2 and 26.4.2
Your corporate standard assigns risk management responsibilities to section 5.4.2 and security control selection to section 26.4.2. A new cloud system is proposed. Determine which activities belong in each section, which baselines to apply, and how to justify any compensating controls.
Authoritative References on Risk Management and Security Controls
Use these authoritative resources to strengthen your understanding of risk management concepts and security control types referenced in this quiz.
- OSHA Hazard Prevention and Control: Explains the hierarchy of controls, hazard control planning, and evaluation of control effectiveness for workplace safety programs.
- NIST Risk Management Framework Project: Describes the structured process for categorizing systems, selecting security controls, and managing information security risk.
- NIST SP 800-53 Rev. 5 Security and Privacy Controls: Provides the federal control catalog used for administrative, technical, and physical safeguards across many environments.
- CISA Cybersecurity Performance Goals: Offers prioritized baseline practices that map to common control families and help reduce cyber risk.
- NFPA 70E Standard for Electrical Safety in the Workplace: Details risk assessment, energized work criteria, and control expectations for electrical hazards.
Risk Management and Security Controls Quiz FAQ
Common Questions on the Risk Management and Security Controls Quiz
How does this quiz relate to OSHA and NFPA requirements?
The quiz reinforces concepts that support OSHA safety management guidelines and NFPA standards such as NFPA 70E. Questions focus on identifying hazards, selecting appropriate control types, and documenting risk decisions that help demonstrate a systematic approach to compliance.
What security control types are covered by the quiz?
You will encounter questions on administrative, technical, and physical controls, along with preventive, detective, corrective, and compensating categories. Expect items that ask you to classify a control, identify missing layers, or choose the most effective control set for a given risk scenario.
What do references to 5.4.2 and 26.4.2 mean in this context?
Many training programs group risk management and security control activities into numbered sections such as 5.4.2 or 26.4.2. The quiz mirrors that style by testing how you assign responsibilities, select baselines, and document control decisions across policy sections and procedures.
How should I approach questions on likelihood and impact ratings?
Use a structured risk matrix. First identify credible consequences such as injury, outage, or data loss. Then estimate realistic likelihood based on exposure, threat activity, and existing controls. The best answer usually reflects documented criteria rather than intuition.
Can this risk management and security controls quiz help with audit preparation?
Yes. The scenarios align with the reasoning auditors expect to see in risk registers, control selection justifications, and residual risk statements. Use wrong answers as a signal that your current documentation or control mapping might be incomplete or inconsistent.
What mistakes should I watch for while taking the quiz?
Do not focus only on cyber security or only on safety. Avoid choosing PPE when elimination or engineering controls are viable. Read carefully for hints about whether the question targets preventive, detective, or corrective actions before selecting an answer.