
Cyber Security and incident management
Authored by William Hall
Computers
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A financial institution has detected unusual activity on its network, indicating a potential cyber attack. As the incident response lead, you need to prioritize actions to mitigate the impact. Which of the following actions should be taken first?
Disconnect all network connections to isolate the threat.
Monitor the activity to gather more information before taking any action.
Notify law enforcement and wait for their instructions.
Inform customers about the potential threat immediately.
Answer explanation
Disconnecting all network connections is crucial to isolate the threat and prevent further damage. Other actions, like monitoring or notifying law enforcement, could allow the attack to escalate.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a cybersecurity incident, you need to coordinate with multiple teams, including IT, legal, and public relations. Develop a communication strategy that ensures all stakeholders are informed and aligned. Which of the following elements should be included in your strategy?
Only inform the IT team to avoid unnecessary panic.
Schedule regular updates with all teams to share progress and next steps.
Wait until the incident is resolved before communicating with any stakeholders.
Share all technical details with the public to maintain transparency.
Answer explanation
Scheduling regular updates with all teams ensures that everyone is informed and aligned throughout the incident. This approach prevents misinformation and keeps all stakeholders engaged, which is crucial during a cybersecurity crisis.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A government agency is developing a cybersecurity incident response framework. The framework should include guidelines for information sharing with other agencies. Which of the following principles should guide the information-sharing process?
Sharing all information with the public to maintain transparency.
Sharing information only with agencies that have a need to know.
Keeping all information confidential to avoid leaks.
Sharing information only after the incident is fully resolved.
Answer explanation
The correct choice is to share information only with agencies that have a need to know. This principle ensures that sensitive information is protected while still facilitating effective collaboration during cybersecurity incidents.
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A healthcare organization needs to ensure that its incident response plan complies with HIPAA regulations. Which of the following actions should be taken to achieve compliance?
Encrypting all patient data to prevent unauthorized access.
Developing a breach notification process that meets HIPAA requirements.
Limiting access to patient data to only healthcare providers.
Implementing a firewall to protect the network.
Answer explanation
To comply with HIPAA, developing a breach notification process is essential, as it outlines how to inform affected individuals. Limiting access to patient data ensures only authorized healthcare providers can view sensitive information.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A multinational corporation is developing a global incident response plan. The plan must account for different regulatory requirements in various countries. Which of the following considerations is most important for ensuring compliance?
Implementing a one-size-fits-all approach to incident response.
Customizing the response plan to meet the specific regulatory requirements of each country.
Focusing only on the regulations of the country where the headquarters is located.
Ignoring regulatory requirements and focusing solely on technical response.
Answer explanation
Customizing the response plan to meet the specific regulatory requirements of each country is crucial for compliance, as regulations vary significantly across jurisdictions and a tailored approach ensures adherence to local laws.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are tasked with creating a cybersecurity awareness training program for employees. The program should include real-world scenarios to help employees recognize and respond to phishing attacks. Which of the following scenarios would be most effective for this training?
A scenario where an employee receives an email from IT asking for their password to update the system.
A scenario where an employee receives a generic email with a link to a fake website.
A scenario where an employee receives a personalized email from a known contact with a suspicious attachment.
A scenario where an employee receives a spam email offering a free vacation.
Answer explanation
The most effective scenario involves a personalized email from a known contact with a suspicious attachment, as it closely mimics real phishing attempts, making employees more likely to encounter and recognize such threats.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
An organization has experienced a ransomware attack. As part of the incident response, you need to decide whether to pay the ransom or not. Which of the following factors should be considered in making this decision?
The amount of the ransom demanded.
The likelihood of recovering data through other means.
The reputation of the attackers.
The opinion of the general public.
Answer explanation
When deciding to pay a ransom, consider the ransom amount and the likelihood of recovering data through other means. These factors directly impact the financial and operational consequences of the attack.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?