Search Header Logo

#02 Incident Response, BC, and DR Concepts

Authored by Kim undefined

Computers

Professional Development

Used 1+ times

#02 Incident Response, BC, and DR Concepts
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)

emergency

event

policy

disaster

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)

risk management

incident detection

malware

disaster

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)

exploit

intrusion

event

malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)

malware

critical

fractal

zero-day

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? The IT department is responsible for creating the organization's business continuity plan. (D2, L2.2.1)

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)

business

technical

IT

financial

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)

guard dogs

data backups

contract personnel

anti-malware solutions

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?