#02 Incident Response, BC, and DR Concepts

Quiz
•
Computers
•
Professional Development
•
Easy
Kim undefined
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)
emergency
event
policy
disaster
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)
risk management
incident detection
malware
disaster
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)
exploit
intrusion
event
malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)
malware
critical
fractal
zero-day
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False? The IT department is responsible for creating the organization's business continuity plan. (D2, L2.2.1)
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)
business
technical
IT
financial
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)
guard dogs
data backups
contract personnel
anti-malware solutions
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Application Attack Indicators

Quiz
•
Professional Development
12 questions
DST07 Day 1 quiz

Quiz
•
Professional Development
10 questions
CND Quiz Week 11

Quiz
•
Professional Development
12 questions
Security+ Lesson1

Quiz
•
Professional Development
15 questions
Microsoft Excel

Quiz
•
Professional Development
14 questions
isc2 sample questions

Quiz
•
Professional Development
15 questions
Security+ Study Guide-11 Implement Policies to Mitigating Risks

Quiz
•
Professional Development
15 questions
SEC+ Ch.7 Review Test

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade