Sales Academy Review Game

Sales Academy Review Game

Professional Development

10 Qs

quiz-placeholder

Similar activities

INFOSEC WEEK DAY 3

INFOSEC WEEK DAY 3

Professional Development

10 Qs

INFOSEC WEEK DAY 2

INFOSEC WEEK DAY 2

Professional Development

10 Qs

Exercise: Information and Computer Security

Exercise: Information and Computer Security

Professional Development

8 Qs

Sophos Event with Direc - Focused Solutions: XDR and Email

Sophos Event with Direc - Focused Solutions: XDR and Email

Professional Development

5 Qs

Information Security Quiz

Information Security Quiz

Professional Development

10 Qs

Server CVE Quiz

Server CVE Quiz

Professional Development

11 Qs

DBP ONE Virtual Session Knowledge Check

DBP ONE Virtual Session Knowledge Check

Professional Development

10 Qs

First_Test_Ver_A

First_Test_Ver_A

Professional Development

14 Qs

Sales Academy Review Game

Sales Academy Review Game

Assessment

Quiz

Other

Professional Development

Easy

Created by

Stefanie McCabe

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the three components of the CIA triad?
Confidentiality, Integrity, Availability
Confident, Intellectual, Availability
Confidentiality, Intelligence, Anonymous
Confidentiality, Integrity, Automation

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

_______ is a notification that a particular event (or series of events) has occurred and it sent to designed parties for further analysis/action.
Parse
False Positive
Alert
Play

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

__________ is calculated from the time an alert is escalated to the time the ticket receives a closure code.
Mean Time to Detect
Mean Time to Notice
Mean Time to Respond

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What team performs analysis of information system to ensure security, identify security flaws, verify the effectiveness of each security measure. They typically also create rules/content to ‘defend’ the network.
Red Team
Purple Team
Blue Team

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Mean time to detect is…..
The average time it takes to recognize a threat requiring further analysis and response efforts
calculated from the time an alert is escalated to the time the ticket receives a closure code.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

When attackers send malicious emails designed to trick people into falling for a scam.
Ransomware
Trojan Horse
Phishing
Malware

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Trojan Horse
Phishing
Spear Phishing
Pharming

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?