#02 Incident Response, BC, and DR Concepts

#02 Incident Response, BC, and DR Concepts

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cyber Security in Power Sector

Cyber Security in Power Sector

Professional Development

8 Qs

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

Professional Development

15 Qs

ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Professional Development

15 Qs

SEC+ Ch.11 Review Test

SEC+ Ch.11 Review Test

Professional Development

15 Qs

Application Attack Indicators

Application Attack Indicators

Professional Development

10 Qs

DST07 Day 1 quiz

DST07 Day 1 quiz

Professional Development

12 Qs

CND Quiz Week 11

CND Quiz Week 11

Professional Development

10 Qs

Security+ Lesson1

Security+ Lesson1

Professional Development

12 Qs

#02 Incident Response, BC, and DR Concepts

#02 Incident Response, BC, and DR Concepts

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Kim undefined

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)

emergency

event

policy

disaster

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)

risk management

incident detection

malware

disaster

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)

exploit

intrusion

event

malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)

malware

critical

fractal

zero-day

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? The IT department is responsible for creating the organization's business continuity plan. (D2, L2.2.1)

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)

business

technical

IT

financial

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)

guard dogs

data backups

contract personnel

anti-malware solutions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?