
Security Incident
Authored by Cyber Hero
Computers
5th Grade
Used 26+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is responsible for identifying and reporting Security Incidents?
IT-Security
Guard
Everybody
DGIT employees
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While responding to security incidents and problems, at which step does "Stop the bleeding" occur?
Eradication
Containment
Lessons learned
Recovery
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or false? Only confirmed personal data breach is reported to GDPO.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What occurs in the recovery phase?
Resume the system to production and normal operations
Stop the bleeding
Root cause analysis and restore the system
improve our defense against same threats
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
External cyber security support is always involved in security problem handling.
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which process step does not include communication to stakeholders?
Containment
Eradication
Lessons learned
None above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is not performed during the Eradication phase?
Root cause analysis
Implement workaround or fix
Restore systems in contained environment
Resume system back to production
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?