Search Header Logo

Sales Academy Review Game

Authored by Stefanie McCabe

Other

Professional Development

Used 1+ times

Sales Academy Review Game
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the three components of the CIA triad?

Confidentiality, Integrity, Availability
Confident, Intellectual, Availability
Confidentiality, Intelligence, Anonymous
Confidentiality, Integrity, Automation

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

_______ is a notification that a particular event (or series of events) has occurred and it sent to designed parties for further analysis/action.

Parse
False Positive
Alert
Play

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

__________ is calculated from the time an alert is escalated to the time the ticket receives a closure code.

Mean Time to Detect
Mean Time to Notice
Mean Time to Respond

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What team performs analysis of information system to ensure security, identify security flaws, verify the effectiveness of each security measure. They typically also create rules/content to ‘defend’ the network.

Red Team
Purple Team
Blue Team

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Mean time to detect is…..

The average time it takes to recognize a threat requiring further analysis and response efforts
calculated from the time an alert is escalated to the time the ticket receives a closure code.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

When attackers send malicious emails designed to trick people into falling for a scam.

Ransomware
Trojan Horse
Phishing
Malware

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Trojan Horse
Phishing
Spear Phishing
Pharming

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?