Cybersecurity Framework

Cybersecurity Framework

University

10 Qs

quiz-placeholder

Similar activities

Dino Code!: The Trivia Showdown

Dino Code!: The Trivia Showdown

University

10 Qs

Living in the IT Era - Q1

Living in the IT Era - Q1

University

15 Qs

Fellowship program 2021

Fellowship program 2021

University - Professional Development

15 Qs

มาตรา14

มาตรา14

University

15 Qs

OCR A Level Computer Science (H446) - Component 1.2.1 - Systems Software

OCR A Level Computer Science (H446) - Component 1.2.1 - Systems Software

11th Grade - University

14 Qs

Computing Legislation A-Level CS

Computing Legislation A-Level CS

10th Grade - University

10 Qs

Chapter 8 Communications & Networks

Chapter 8 Communications & Networks

University - Professional Development

15 Qs

Intrusion Detection System - Quiz

Intrusion Detection System - Quiz

University

10 Qs

Cybersecurity Framework

Cybersecurity Framework

Assessment

Quiz

Computers

University

Hard

Created by

al chua

Used 51+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Identify function of the IPDRR Framework.

Identify who should be held responsible if incident happen.

Identify the attack on the system.

Identify and understand the systems, assets, data and capabilities of the organization.

Identify and understand the organization risk assessment and risk management strategy.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access control is part of the Protect function of IPDRR. Which of the following is not part of access control.

Two-factor authentication

Encrypt data

Deploy security guards

Remove unused accounts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewall generally works on

Layer 1 and 2 of OSI model

Layer 3 and 4 of OSI model

Layer 6 and 7 of OSI model

All of the above

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is an IDS capable of?

Alerting

Taking action

Detection

Identify Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a honeypot?

To flag attack against known vulnerabilities.

To reduce false positives in a signature-base IDS

To randomly check suspicious traffic identified by IDS

To enhance the accuracy of a IDS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an anti-virus?

Analyse and monitor network traffic for signs that indicate attackers are using known cyberthreat to infiltrate or steal data from a network.

Able to identify malicious activity, report it and block it.

Limits access between networks to prevent intrusion and do not signal an attack from inside the network.

To detect and destroy known threats.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the wrong step to respond to a cyber-incident.

Turn off involved computer system.

Disconnect the computer system from all network

Isolate all involved computer system.

Communicate with stakeholders, law enforcement and/or external stakeholders

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?