GROUP 3 - QUIZ

GROUP 3 - QUIZ

University

10 Qs

quiz-placeholder

Similar activities

IIS - Topic 2

IIS - Topic 2

University

6 Qs

Application and Network Security

Application and Network Security

University

8 Qs

CISD113 - 3

CISD113 - 3

University

15 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Backup, Restore, and Recovery

Backup, Restore, and Recovery

9th Grade - University

7 Qs

ICC1 - Wednesday - Azure Fundamentals Quiz

ICC1 - Wednesday - Azure Fundamentals Quiz

University

11 Qs

Operations Security (OpSec)

Operations Security (OpSec)

University

10 Qs

S2C SECURITY MEASURES

S2C SECURITY MEASURES

University

9 Qs

GROUP 3 - QUIZ

GROUP 3 - QUIZ

Assessment

Quiz

Computers

University

Easy

Created by

Liyaaa G

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the first step in the five-step process for security incident management/handling?

Identify potential security incidents through monitoring documents and all incidents.

Prepare for handling incidents.

Learn and document key takeaways from every incident.

Respond to the incident by containing, investigating, and resolving it.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the process of identifying, managing, recording, and analyzing security threats or incidents in real-time.

Backup and recovery

Monitoring of Cyber Risk Management

Risk Management

Security incident management

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered the Importance of Data Backup and Recovery in Any Security Strategy?

Identify prime backup targets

Throwing resources at the problem

Loss of data

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It causes disruption or interference to an organization.

Backup and Recovery

Incident

Risk

Threat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the process of documenting all workplace injuries, near misses, and accidents.

Incident Documentation

/Report

Security incident Management

Create a comprehensive security strategy

Incident

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is usually refers to the transfer of copied files from one (1) location to another, along with the various operations performed on those files.

Incident

Risk

Backup and Recovery

Security incident management

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are the advantages of backup and recovery, except:

Protecting a user in the event of hardware failure, accidental deletions, or disaster.

Protecting a user against unauthorized changes made by an intruder.

Identify prime backup targets

Providing a user with a history of an intruder’s activities by looking through archived or older backups.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?