#02 Incident Response, BC, and DR Concepts

#02 Incident Response, BC, and DR Concepts

Professional Development

10 Qs

quiz-placeholder

Similar activities

Mantenimiento 2°2

Mantenimiento 2°2

Professional Development

15 Qs

Dataverse Introduction

Dataverse Introduction

Professional Development

10 Qs

Sains Komputer Tingkatan 5 - 1.3.3 Membina Jadual Kebenaran

Sains Komputer Tingkatan 5 - 1.3.3 Membina Jadual Kebenaran

1st Grade - Professional Development

15 Qs

Software Security

Software Security

University - Professional Development

10 Qs

C Programming

C Programming

Professional Development

10 Qs

Advance MS Excel Tips and Tricks

Advance MS Excel Tips and Tricks

Professional Development

10 Qs

Introduction to Hyperconverged: HCI 101

Introduction to Hyperconverged: HCI 101

Professional Development

10 Qs

Python-quiz2

Python-quiz2

University - Professional Development

11 Qs

#02 Incident Response, BC, and DR Concepts

#02 Incident Response, BC, and DR Concepts

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

Kim undefined

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)

emergency

event

policy

disaster

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)

risk management

incident detection

malware

disaster

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)

exploit

intrusion

event

malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)

malware

critical

fractal

zero-day

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? The IT department is responsible for creating the organization's business continuity plan. (D2, L2.2.1)

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)

business

technical

IT

financial

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)

guard dogs

data backups

contract personnel

anti-malware solutions

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?