Search Header Logo

Basic Cybersecurity Concepts 1

Authored by Isabella S

Instructional Technology

Professional Development

Used 37+ times

Basic Cybersecurity Concepts 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following steps is required to mitigate data breach risks?

Use strong credentials and disable multi-factor authentication.

Use strong credentials and enable multi-factor authentication.

Reuse passwords, because it is easier that way.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

What is the most common password in 2019 according to NCSC?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CYDEO customers' personal information was breached, what should be done?

Notify customers and let them know about the breach.

Ignore customers and deal with them later.

Not tell anyone about the breach and delay until things are calmed down.

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which of the following should you monitor or include in the SIEM? (select multiple)

Laptops

Antivirus

Servers

Routers

Firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Can SIEM work by itself, or does it need input from other devices?

It works directly with a firewall.

It depends on the company's infrastructure.

It needs input from other devices.

It can work by itself.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would NOT be one of SOAR solutions for your company in case of a ransomware attack?

Automate the steps to be taken once the incident was detected.

Help to collaborate between SOC analysts.

Automatically fix the issue.

Provide a clear path on the escalation process.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which is the correct order of the incident response process steps?

Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned

Lessons Learned, Recovery, Eradication, Containment, Identification, Preparation

Identification, Preparation, Containment, Eradication, Lessons Learned, Recovery

Identification, Preparation, Containment, Eradication, Recovery, Lessons Learned

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?