#02 Incident Response, BC, and DR Concepts

Quiz
•
Computers
•
Professional Development
•
Easy
Kim undefined
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)
emergency
event
policy
disaster
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)
risk management
incident detection
malware
disaster
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)
exploit
intrusion
event
malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)
malware
critical
fractal
zero-day
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False? The IT department is responsible for creating the organization's business continuity plan. (D2, L2.2.1)
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)
business
technical
IT
financial
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)
guard dogs
data backups
contract personnel
anti-malware solutions
Create a free account and access millions of resources
Similar Resources on Wayground
8 questions
ITF - Quiz 2.3 - Virtualization

Quiz
•
Professional Development
10 questions
Peligros del email

Quiz
•
Professional Development
8 questions
Elastic Essentials Quiz

Quiz
•
Professional Development
11 questions
Cloud Computing

Quiz
•
KG - Professional Dev...
15 questions
Cuestionario sin título

Quiz
•
Professional Development
13 questions
CyberSecurity

Quiz
•
Professional Development
7 questions
Shasimi vol. 32

Quiz
•
Professional Development
10 questions
Port Scanning

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development