
#02 Incident Response, BC, and DR Concepts
Authored by Kim undefined
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)
emergency
event
policy
disaster
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)
risk management
incident detection
malware
disaster
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)
exploit
intrusion
event
malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)
malware
critical
fractal
zero-day
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False? The IT department is responsible for creating the organization's business continuity plan. (D2, L2.2.1)
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)
business
technical
IT
financial
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)
guard dogs
data backups
contract personnel
anti-malware solutions
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?