
Basic Cybersecurity Concepts 1
Authored by Isabella S
Instructional Technology
Professional Development
Used 37+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following steps is required to mitigate data breach risks?
Use strong credentials and disable multi-factor authentication.
Use strong credentials and enable multi-factor authentication.
Reuse passwords, because it is easier that way.
2.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
What is the most common password in 2019 according to NCSC?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CYDEO customers' personal information was breached, what should be done?
Notify customers and let them know about the breach.
Ignore customers and deal with them later.
Not tell anyone about the breach and delay until things are calmed down.
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which of the following should you monitor or include in the SIEM? (select multiple)
Laptops
Antivirus
Servers
Routers
Firewall
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Can SIEM work by itself, or does it need input from other devices?
It works directly with a firewall.
It depends on the company's infrastructure.
It needs input from other devices.
It can work by itself.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What would NOT be one of SOAR solutions for your company in case of a ransomware attack?
Automate the steps to be taken once the incident was detected.
Help to collaborate between SOC analysts.
Automatically fix the issue.
Provide a clear path on the escalation process.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which is the correct order of the incident response process steps?
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Lessons Learned, Recovery, Eradication, Containment, Identification, Preparation
Identification, Preparation, Containment, Eradication, Lessons Learned, Recovery
Identification, Preparation, Containment, Eradication, Recovery, Lessons Learned
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?