
Cybersecurity Framework
Quiz
•
Computers
•
University
•
Practice Problem
•
Hard
al chua
Used 52+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the Identify function of the IPDRR Framework.
Identify who should be held responsible if incident happen.
Identify the attack on the system.
Identify and understand the systems, assets, data and capabilities of the organization.
Identify and understand the organization risk assessment and risk management strategy.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Access control is part of the Protect function of IPDRR. Which of the following is not part of access control.
Two-factor authentication
Encrypt data
Deploy security guards
Remove unused accounts
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Firewall generally works on
Layer 1 and 2 of OSI model
Layer 3 and 4 of OSI model
Layer 6 and 7 of OSI model
All of the above
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following is an IDS capable of?
Alerting
Taking action
Detection
Identify Attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a honeypot?
To flag attack against known vulnerabilities.
To reduce false positives in a signature-base IDS
To randomly check suspicious traffic identified by IDS
To enhance the accuracy of a IDS
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of an anti-virus?
Analyse and monitor network traffic for signs that indicate attackers are using known cyberthreat to infiltrate or steal data from a network.
Able to identify malicious activity, report it and block it.
Limits access between networks to prevent intrusion and do not signal an attack from inside the network.
To detect and destroy known threats.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is the wrong step to respond to a cyber-incident.
Turn off involved computer system.
Disconnect the computer system from all network
Isolate all involved computer system.
Communicate with stakeholders, law enforcement and/or external stakeholders
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
0 questions
CSE 362: Introduction to Computer Security Quiz
Quiz
•
0 questions
NSA's Top Ten Cybersecurity Mitigation Strategies
Quiz
•
0 questions
Cybersecurity Foundations Quiz
Quiz
•
0 questions
CyberSecurity Essentials Module 2
Quiz
•
0 questions
Sec Review 5
Quiz
•
0 questions
Security Controls Quiz
Quiz
•
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
20 questions
christmas songs
Quiz
•
KG - University
20 questions
Holiday Trivia
Quiz
•
9th Grade - University
15 questions
Holiday Movies
Quiz
•
University
14 questions
Christmas Trivia
Quiz
•
3rd Grade - University
20 questions
Christmas Trivia
Quiz
•
University
8 questions
5th, Unit 4, Lesson 8
Lesson
•
KG - Professional Dev...
20 questions
Disney Trivia
Quiz
•
University
