Unit 11 Topic D: Incident Response Policies

Unit 11 Topic D: Incident Response Policies

12th Grade

10 Qs

quiz-placeholder

Similar activities

Scratch

Scratch

KG - Professional Development

10 Qs

Java: repetition control structure for & while

Java: repetition control structure for & while

10th - 12th Grade

10 Qs

Review

Review

9th - 12th Grade

10 Qs

POST TES 3.3 Mengevaluasi permasalahan jaringan nirkabel

POST TES 3.3 Mengevaluasi permasalahan jaringan nirkabel

12th Grade - Professional Development

10 Qs

Perencanaan Pengalamatan Jaringan

Perencanaan Pengalamatan Jaringan

9th - 12th Grade

15 Qs

evolution of computer

evolution of computer

9th - 12th Grade

14 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

How the Internet Works

How the Internet Works

4th Grade - University

14 Qs

Unit 11 Topic D: Incident Response Policies

Unit 11 Topic D: Incident Response Policies

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ralph Ellis

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An event that poses a threat to the business information, in regard to its confidentiality, integrity & availability

An information security incident

A total data recovery failure

A backup server breach

A power failure in the server room

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an incident is detected or suspected what is the first action that should take place?

It must be reported to the appropriate person (probably the CSIRT team leader)

Whoever discovers the incident must perform an initial assessment of the event

Switch off the servers so that no more breaches can take place

Ignore it and hope it goes away

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an initial assessment of the event takes place, what is the first thing to identify?

Whether an actual incident has taken place at all

How to minimise the risk

Who is going to be responsible for performing the incident response

Whether or not it is an internal security breach

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Two things that need to be identified during an initial assessment of an incident:

Type of attack

Severity of attack

How much it will cost to resolve the incident

Whether or not to inform the police

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Containing the damage and minimising the risk has five areas, including which of the following?

Protecting people’s safety

Protecting sensitive data

Minimising disruption to computing resources

Ensuring that no-one knows that an incident has taken place

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Following a security incident, which of the following four things are required to be identified and documented?

The nature of the attack

The origin of the attack

The intent of the attack

What systems & files were compromised

How much it will cost to resolve the incident

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following two reasons explain why two backups are required when protecting evidence following a security incident?

To be used as evidence

For data recovery

In case the evidence has been tampered with

Checks on data inconsistency

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers