Unit 11 Topic D: Incident Response Policies

Unit 11 Topic D: Incident Response Policies

12th Grade

10 Qs

quiz-placeholder

Similar activities

Incident Response Policy 1 Quiz

Incident Response Policy 1 Quiz

12th Grade

12 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Incident Response

Incident Response

12th Grade

11 Qs

GenCyber

GenCyber

11th Grade - University

10 Qs

Security Controls

Security Controls

12th Grade

10 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Digital Security

Digital Security

9th - 12th Grade

10 Qs

cybersecurity_5

cybersecurity_5

12th Grade

11 Qs

Unit 11 Topic D: Incident Response Policies

Unit 11 Topic D: Incident Response Policies

Assessment

Quiz

Created by

Ralph Ellis

Computers

12th Grade

17 plays

Hard

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An event that poses a threat to the business information, in regard to its confidentiality, integrity & availability

An information security incident

A total data recovery failure

A backup server breach

A power failure in the server room

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an incident is detected or suspected what is the first action that should take place?

It must be reported to the appropriate person (probably the CSIRT team leader)

Whoever discovers the incident must perform an initial assessment of the event

Switch off the servers so that no more breaches can take place

Ignore it and hope it goes away

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an initial assessment of the event takes place, what is the first thing to identify?

Whether an actual incident has taken place at all

How to minimise the risk

Who is going to be responsible for performing the incident response

Whether or not it is an internal security breach

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Two things that need to be identified during an initial assessment of an incident:

Type of attack

Severity of attack

How much it will cost to resolve the incident

Whether or not to inform the police

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Containing the damage and minimising the risk has five areas, including which of the following?

Protecting people’s safety

Protecting sensitive data

Minimising disruption to computing resources

Ensuring that no-one knows that an incident has taken place

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Following a security incident, which of the following four things are required to be identified and documented?

The nature of the attack

The origin of the attack

The intent of the attack

What systems & files were compromised

How much it will cost to resolve the incident

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following two reasons explain why two backups are required when protecting evidence following a security incident?

To be used as evidence

For data recovery

In case the evidence has been tampered with

Checks on data inconsistency

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?