Security Incident

Security Incident

5th Grade

12 Qs

quiz-placeholder

Similar activities

Cybersecurity vocab :)

Cybersecurity vocab :)

1st Grade - Professional Development

15 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Review Quiz Grade V

Review Quiz Grade V

5th Grade

10 Qs

Cyber Security

Cyber Security

3rd - 5th Grade

10 Qs

Account Security Quiz

Account Security Quiz

5th Grade

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Privacy and Security multiple choice test

Privacy and Security multiple choice test

1st - 5th Grade

10 Qs

Online scams and frauds

Online scams and frauds

KG - Professional Development

9 Qs

Security Incident

Security Incident

Assessment

Quiz

Computers

5th Grade

Medium

Created by

Cyber Hero

Used 26+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Who is responsible for identifying and reporting Security Incidents?

IT-Security

Guard

Everybody

DGIT employees

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

While responding to security incidents and problems, at which step does "Stop the bleeding" occur?

Eradication

Containment

Lessons learned

Recovery

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

True or false? Only confirmed personal data breach is reported to GDPO.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What occurs in the recovery phase?

Resume the system to production and normal operations

Stop the bleeding

Root cause analysis and restore the system

improve our defense against same threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

External cyber security support is always involved in security problem handling.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which process step does not include communication to stakeholders?

Containment

Eradication

Lessons learned

None above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is not performed during the Eradication phase?

Root cause analysis

Implement workaround or fix

Restore systems in contained environment

Resume system back to production

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?