Your organization has noticed an increase in phishing attacks. What is the most effective initial response?
ISMS Assessment

Quiz
•
Instructional Technology
•
Professional Development
•
Easy
Alaine Ng
Used 11+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Block all emails from external sources.
Conduct security awareness and phishing training for employees.
Purchase a new anti-phishing tool.
Restrict access to email for most employees.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A critical software used by your organization is reaching end-of-life. What should you do?
Keep using it while restricting access.
Negotiate with the vendor for extended support.
Immediately replace it with an alternative.
Plan a migration to supported software.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Following a data breach, what is the first action the company should take?
Revise the incident response plan.
Conduct a post-incident review.
Penalize responsible employees.
Immediately notify customers.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in implementing an ISMS in a small company?
Buy cybersecurity tools.
Define the ISMS scope and objectives.
Start employee training on cybersecurity.
Hire a security team.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sensitive data was accessed by an unauthorized department. What do you do first?
Restrict access and review controls.
Delete the data.
Ignore, since it was internal.
Report to law enforcement.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a risk assessment, it's discovered that a critical piece of software used by the organization is nearing end-of-life and will no longer receive security updates. What is the BEST course of action?
Continue using the software while restricting access to it.
Seek an extension of support from the software vendor.
Immediately switch to an alternative without a risk analysis.
Plan and execute a migration to a supported software solution.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee loses a company-issued laptop containing unencrypted personally identifiable information (PII) of clients. Which of the following actions should be taken FIRST?
Assess the impact of the lost data and determine the breach's severity.
Ignore the incident if the laptop is password protected.
Immediately inform all clients about the potential data breach.
Suspend the responsible employee.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
MOODLE LMS

Quiz
•
10th Grade - Professi...
15 questions
Vehicle Telematics

Quiz
•
12th Grade - Professi...
22 questions
BCS Network Security Test 8

Quiz
•
University - Professi...
20 questions
Google Professional Architect 9 - 161 to 180

Quiz
•
Professional Development
24 questions
BCS Network Security Test 6

Quiz
•
University - Professi...
20 questions
IT (Information technology) - Adérito Neto PI0919

Quiz
•
10th Grade - Professi...
21 questions
Hardware y Software

Quiz
•
Professional Development
25 questions
Warm Up Game

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade