Unit 11 Topic D: Incident Response Policies

Quiz
•
Computers
•
12th Grade
•
Hard
Ralph Ellis
Used 17+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An event that poses a threat to the business information, in regard to its confidentiality, integrity & availability
An information security incident
A total data recovery failure
A backup server breach
A power failure in the server room
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When an incident is detected or suspected what is the first action that should take place?
It must be reported to the appropriate person (probably the CSIRT team leader)
Whoever discovers the incident must perform an initial assessment of the event
Switch off the servers so that no more breaches can take place
Ignore it and hope it goes away
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When an initial assessment of the event takes place, what is the first thing to identify?
Whether an actual incident has taken place at all
How to minimise the risk
Who is going to be responsible for performing the incident response
Whether or not it is an internal security breach
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Two things that need to be identified during an initial assessment of an incident:
Type of attack
Severity of attack
How much it will cost to resolve the incident
Whether or not to inform the police
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Containing the damage and minimising the risk has five areas, including which of the following?
Protecting people’s safety
Protecting sensitive data
Minimising disruption to computing resources
Ensuring that no-one knows that an incident has taken place
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Following a security incident, which of the following four things are required to be identified and documented?
The nature of the attack
The origin of the attack
The intent of the attack
What systems & files were compromised
How much it will cost to resolve the incident
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following two reasons explain why two backups are required when protecting evidence following a security incident?
To be used as evidence
For data recovery
In case the evidence has been tampered with
Checks on data inconsistency
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
CTEC IT Unit 3 PH Virtual Challenges

Quiz
•
12th Grade
9 questions
Basic cyber security knowledge

Quiz
•
KG - University
15 questions
DETECTING AND PREVENTING CYBER SECURITY THREATS

Quiz
•
9th - 12th Grade
10 questions
DFIR Incidents and Containment

Quiz
•
12th Grade
10 questions
Physical Security

Quiz
•
1st Grade - University
15 questions
Cyber Incident Quiz

Quiz
•
12th Grade - University
13 questions
Cyber Security Quiz

Quiz
•
12th Grade
10 questions
POCS-Ch2.1 (Vocab)

Quiz
•
7th - 12th Grade
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Computers
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
62 questions
Spanish Speaking Countries, Capitals, and Locations

Quiz
•
9th - 12th Grade
20 questions
First Day of School

Quiz
•
6th - 12th Grade
6 questions
Maier - AMDM - Unit 1 - Quiz 1 - Estimation

Quiz
•
12th Grade
21 questions
Arithmetic Sequences

Quiz
•
9th - 12th Grade
21 questions
9th Grade English Diagnostic Quiz

Quiz
•
9th - 12th Grade
7 questions
Characteristics of Life

Interactive video
•
11th Grade - University