Cybersecurity Framework

Cybersecurity Framework

University

10 Qs

quiz-placeholder

Similar activities

CSE 362: Introduction to Computer Security Quiz

CSE 362: Introduction to Computer Security Quiz

NSA's Top Ten Cybersecurity Mitigation Strategies

NSA's Top Ten Cybersecurity Mitigation Strategies

Cybersecurity Foundations Quiz

Cybersecurity Foundations Quiz

CyberSecurity Essentials Module 2

CyberSecurity Essentials Module 2

Sec Review 5

Sec Review 5

Security Controls Quiz

Security Controls Quiz

Cybersecurity Framework

Cybersecurity Framework

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

al chua

Used 52+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Identify function of the IPDRR Framework.

Identify who should be held responsible if incident happen.

Identify the attack on the system.

Identify and understand the systems, assets, data and capabilities of the organization.

Identify and understand the organization risk assessment and risk management strategy.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access control is part of the Protect function of IPDRR. Which of the following is not part of access control.

Two-factor authentication

Encrypt data

Deploy security guards

Remove unused accounts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewall generally works on

Layer 1 and 2 of OSI model

Layer 3 and 4 of OSI model

Layer 6 and 7 of OSI model

All of the above

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is an IDS capable of?

Alerting

Taking action

Detection

Identify Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a honeypot?

To flag attack against known vulnerabilities.

To reduce false positives in a signature-base IDS

To randomly check suspicious traffic identified by IDS

To enhance the accuracy of a IDS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an anti-virus?

Analyse and monitor network traffic for signs that indicate attackers are using known cyberthreat to infiltrate or steal data from a network.

Able to identify malicious activity, report it and block it.

Limits access between networks to prevent intrusion and do not signal an attack from inside the network.

To detect and destroy known threats.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the wrong step to respond to a cyber-incident.

Turn off involved computer system.

Disconnect the computer system from all network

Isolate all involved computer system.

Communicate with stakeholders, law enforcement and/or external stakeholders

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?