CSIRP Training

CSIRP Training

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cyber Security New

Cyber Security New

Professional Development

15 Qs

Beware the Phish

Beware the Phish

Professional Development

10 Qs

Ethical Hacking Essentials

Ethical Hacking Essentials

Professional Development

13 Qs

ECO Cyber Security Scavenger Hunt

ECO Cyber Security Scavenger Hunt

Professional Development

10 Qs

CyberSecurity

CyberSecurity

Professional Development

12 Qs

IT Security

IT Security

Professional Development

10 Qs

Post Test - Sharing Session Keamanan Infrastruktur TI

Post Test - Sharing Session Keamanan Infrastruktur TI

Professional Development

10 Qs

Design Secure Network

Design Secure Network

Professional Development

10 Qs

CSIRP Training

CSIRP Training

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Risk MTB

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What is CSIRP stands for?

Cyber Security Incident Response Plan

Cyber Security Incident Regulatory Plan

Cyber Security Incident Risk Plan

Cyber Security Immediate Response Plan

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Your business email account has been compromised and leaked. What is the first course of action?

Nothing, it is a responsibility of Group IT

Change your Outlook password immediately

Inform the security team of your organization

Change the Password on all sites where you use the same password and inform the IT Team

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which one is NOT a good password ​management practice?

Use alphanumeric characters in the password

Re-use the password for easy to memorize

Avoid using keyword that can be associated with your ID

Use a long passphrase

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What do you need to do if you see any security incident, abnormalities, or non-compliant behaviour?

Tell the vendors

Keep it secret

Report to Group IT and Incident Response Team ("IRT")

Post in social media

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Fake e-mail message appearing to be from a trusted business, social network or other contact asks for personal information or requests a user to click on a link or attachment so that hackers can secretly collect personal information and data. This act is called?

Ransomware

Inside Threats

Phishing

Advances persistent Threats

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

How does malware get onto your computer?

Email attachments or links

By visiting unreliable websites

On USB sticks

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Who should know your passwords?

You & Group IT

You & Senior Management

Anyone

Only You

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?