Search Header Logo

Cybersecurity Framework

Authored by al chua

Computers

University

Used 52+ times

Cybersecurity Framework
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Identify function of the IPDRR Framework.

Identify who should be held responsible if incident happen.

Identify the attack on the system.

Identify and understand the systems, assets, data and capabilities of the organization.

Identify and understand the organization risk assessment and risk management strategy.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access control is part of the Protect function of IPDRR. Which of the following is not part of access control.

Two-factor authentication

Encrypt data

Deploy security guards

Remove unused accounts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewall generally works on

Layer 1 and 2 of OSI model

Layer 3 and 4 of OSI model

Layer 6 and 7 of OSI model

All of the above

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is an IDS capable of?

Alerting

Taking action

Detection

Identify Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a honeypot?

To flag attack against known vulnerabilities.

To reduce false positives in a signature-base IDS

To randomly check suspicious traffic identified by IDS

To enhance the accuracy of a IDS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an anti-virus?

Analyse and monitor network traffic for signs that indicate attackers are using known cyberthreat to infiltrate or steal data from a network.

Able to identify malicious activity, report it and block it.

Limits access between networks to prevent intrusion and do not signal an attack from inside the network.

To detect and destroy known threats.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the wrong step to respond to a cyber-incident.

Turn off involved computer system.

Disconnect the computer system from all network

Isolate all involved computer system.

Communicate with stakeholders, law enforcement and/or external stakeholders

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers