Search Header Logo

Security Incident

Authored by Cyber Hero

Computers

5th Grade

Used 26+ times

Security Incident
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Who is responsible for identifying and reporting Security Incidents?

IT-Security

Guard

Everybody

DGIT employees

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

While responding to security incidents and problems, at which step does "Stop the bleeding" occur?

Eradication

Containment

Lessons learned

Recovery

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

True or false? Only confirmed personal data breach is reported to GDPO.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What occurs in the recovery phase?

Resume the system to production and normal operations

Stop the bleeding

Root cause analysis and restore the system

improve our defense against same threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

External cyber security support is always involved in security problem handling.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which process step does not include communication to stakeholders?

Containment

Eradication

Lessons learned

None above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is not performed during the Eradication phase?

Root cause analysis

Implement workaround or fix

Restore systems in contained environment

Resume system back to production

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?