Basic Cybersecurity Concepts 1

Basic Cybersecurity Concepts 1

Professional Development

25 Qs

quiz-placeholder

Similar activities

Drill Press/Shop safety rules

Drill Press/Shop safety rules

KG - Professional Development

26 Qs

C1 - NetSec

C1 - NetSec

Professional Development

24 Qs

INFORMATION SECURITY

INFORMATION SECURITY

Professional Development

30 Qs

BCS System & Architecture Quiz 7

BCS System & Architecture Quiz 7

University - Professional Development

20 Qs

NextGen   MCSA  MCQ Test

NextGen MCSA MCQ Test

Professional Development

30 Qs

AWS SAA - 28

AWS SAA - 28

Professional Development

20 Qs

Store Leader Development Program - Erajaya Digital

Store Leader Development Program - Erajaya Digital

Professional Development

25 Qs

Digital Literacy Training

Digital Literacy Training

Professional Development

20 Qs

Basic Cybersecurity Concepts 1

Basic Cybersecurity Concepts 1

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Isabella S

Used 35+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following steps is required to mitigate data breach risks?

Use strong credentials and disable multi-factor authentication.

Use strong credentials and enable multi-factor authentication.

Reuse passwords, because it is easier that way.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

What is the most common password in 2019 according to NCSC?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CYDEO customers' personal information was breached, what should be done?

Notify customers and let them know about the breach.

Ignore customers and deal with them later.

Not tell anyone about the breach and delay until things are calmed down.

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which of the following should you monitor or include in the SIEM? (select multiple)

Laptops

Antivirus

Servers

Routers

Firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Can SIEM work by itself, or does it need input from other devices?

It works directly with a firewall.

It depends on the company's infrastructure.

It needs input from other devices.

It can work by itself.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would NOT be one of SOAR solutions for your company in case of a ransomware attack?

Automate the steps to be taken once the incident was detected.

Help to collaborate between SOC analysts.

Automatically fix the issue.

Provide a clear path on the escalation process.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which is the correct order of the incident response process steps?

Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned

Lessons Learned, Recovery, Eradication, Containment, Identification, Preparation

Identification, Preparation, Containment, Eradication, Lessons Learned, Recovery

Identification, Preparation, Containment, Eradication, Recovery, Lessons Learned

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?