Search Header Logo

Unit 11 Topic D: Incident Response Policies

Authored by Ralph Ellis

Computers

12th Grade

Used 18+ times

Unit 11 Topic D: Incident Response Policies
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An event that poses a threat to the business information, in regard to its confidentiality, integrity & availability

An information security incident

A total data recovery failure

A backup server breach

A power failure in the server room

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an incident is detected or suspected what is the first action that should take place?

It must be reported to the appropriate person (probably the CSIRT team leader)

Whoever discovers the incident must perform an initial assessment of the event

Switch off the servers so that no more breaches can take place

Ignore it and hope it goes away

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an initial assessment of the event takes place, what is the first thing to identify?

Whether an actual incident has taken place at all

How to minimise the risk

Who is going to be responsible for performing the incident response

Whether or not it is an internal security breach

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Two things that need to be identified during an initial assessment of an incident:

Type of attack

Severity of attack

How much it will cost to resolve the incident

Whether or not to inform the police

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Containing the damage and minimising the risk has five areas, including which of the following?

Protecting people’s safety

Protecting sensitive data

Minimising disruption to computing resources

Ensuring that no-one knows that an incident has taken place

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Following a security incident, which of the following four things are required to be identified and documented?

The nature of the attack

The origin of the attack

The intent of the attack

What systems & files were compromised

How much it will cost to resolve the incident

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following two reasons explain why two backups are required when protecting evidence following a security incident?

To be used as evidence

For data recovery

In case the evidence has been tampered with

Checks on data inconsistency

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?