
Cyber Security and incident management

Quiz
•
Computers
•
12th Grade
•
Medium
William Hall
Used 3+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A financial institution has detected unusual activity on its network, indicating a potential cyber attack. As the incident response lead, you need to prioritize actions to mitigate the impact. Which of the following actions should be taken first?
Disconnect all network connections to isolate the threat.
Monitor the activity to gather more information before taking any action.
Notify law enforcement and wait for their instructions.
Inform customers about the potential threat immediately.
Answer explanation
Disconnecting all network connections is crucial to isolate the threat and prevent further damage. Other actions, like monitoring or notifying law enforcement, could allow the attack to escalate.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a cybersecurity incident, you need to coordinate with multiple teams, including IT, legal, and public relations. Develop a communication strategy that ensures all stakeholders are informed and aligned. Which of the following elements should be included in your strategy?
Only inform the IT team to avoid unnecessary panic.
Schedule regular updates with all teams to share progress and next steps.
Wait until the incident is resolved before communicating with any stakeholders.
Share all technical details with the public to maintain transparency.
Answer explanation
Scheduling regular updates with all teams ensures that everyone is informed and aligned throughout the incident. This approach prevents misinformation and keeps all stakeholders engaged, which is crucial during a cybersecurity crisis.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A government agency is developing a cybersecurity incident response framework. The framework should include guidelines for information sharing with other agencies. Which of the following principles should guide the information-sharing process?
Sharing all information with the public to maintain transparency.
Sharing information only with agencies that have a need to know.
Keeping all information confidential to avoid leaks.
Sharing information only after the incident is fully resolved.
Answer explanation
The correct choice is to share information only with agencies that have a need to know. This principle ensures that sensitive information is protected while still facilitating effective collaboration during cybersecurity incidents.
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A healthcare organization needs to ensure that its incident response plan complies with HIPAA regulations. Which of the following actions should be taken to achieve compliance?
Encrypting all patient data to prevent unauthorized access.
Developing a breach notification process that meets HIPAA requirements.
Limiting access to patient data to only healthcare providers.
Implementing a firewall to protect the network.
Answer explanation
To comply with HIPAA, developing a breach notification process is essential, as it outlines how to inform affected individuals. Limiting access to patient data ensures only authorized healthcare providers can view sensitive information.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A multinational corporation is developing a global incident response plan. The plan must account for different regulatory requirements in various countries. Which of the following considerations is most important for ensuring compliance?
Implementing a one-size-fits-all approach to incident response.
Customizing the response plan to meet the specific regulatory requirements of each country.
Focusing only on the regulations of the country where the headquarters is located.
Ignoring regulatory requirements and focusing solely on technical response.
Answer explanation
Customizing the response plan to meet the specific regulatory requirements of each country is crucial for compliance, as regulations vary significantly across jurisdictions and a tailored approach ensures adherence to local laws.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are tasked with creating a cybersecurity awareness training program for employees. The program should include real-world scenarios to help employees recognize and respond to phishing attacks. Which of the following scenarios would be most effective for this training?
A scenario where an employee receives an email from IT asking for their password to update the system.
A scenario where an employee receives a generic email with a link to a fake website.
A scenario where an employee receives a personalized email from a known contact with a suspicious attachment.
A scenario where an employee receives a spam email offering a free vacation.
Answer explanation
The most effective scenario involves a personalized email from a known contact with a suspicious attachment, as it closely mimics real phishing attempts, making employees more likely to encounter and recognize such threats.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
An organization has experienced a ransomware attack. As part of the incident response, you need to decide whether to pay the ransom or not. Which of the following factors should be considered in making this decision?
The amount of the ransom demanded.
The likelihood of recovering data through other means.
The reputation of the attackers.
The opinion of the general public.
Answer explanation
When deciding to pay a ransom, consider the ransom amount and the likelihood of recovering data through other means. These factors directly impact the financial and operational consequences of the attack.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Security Testing Quiz

Quiz
•
12th Grade
11 questions
WJEC ICT - Chapter 3 - Data loss, theft and manipulation

Quiz
•
10th Grade - University
10 questions
Incident Response Life Cycle Quiz

Quiz
•
12th Grade
16 questions
Computer Security Risk

Quiz
•
12th Grade - University
15 questions
Understanding Social Media Threats

Quiz
•
12th Grade
10 questions
Continuous Monitoring and Improvement Quiz

Quiz
•
12th Grade
10 questions
Telecommunications & Networking

Quiz
•
9th Grade - University
10 questions
Make the Right Choice LAP Quiz

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade