Search Header Logo

GROUP 3 - QUIZ

Authored by Liyaaa G

Computers

University

Used 1+ times

GROUP 3 - QUIZ
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the first step in the five-step process for security incident management/handling?

Identify potential security incidents through monitoring documents and all incidents.

Prepare for handling incidents.

Learn and document key takeaways from every incident.

Respond to the incident by containing, investigating, and resolving it.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the process of identifying, managing, recording, and analyzing security threats or incidents in real-time.

Backup and recovery

Monitoring of Cyber Risk Management

Risk Management

Security incident management

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered the Importance of Data Backup and Recovery in Any Security Strategy?

Identify prime backup targets

Throwing resources at the problem

Loss of data

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It causes disruption or interference to an organization.

Backup and Recovery

Incident

Risk

Threat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the process of documenting all workplace injuries, near misses, and accidents.

Incident Documentation

/Report

Security incident Management

Create a comprehensive security strategy

Incident

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is usually refers to the transfer of copied files from one (1) location to another, along with the various operations performed on those files.

Incident

Risk

Backup and Recovery

Security incident management

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are the advantages of backup and recovery, except:

Protecting a user in the event of hardware failure, accidental deletions, or disaster.

Protecting a user against unauthorized changes made by an intruder.

Identify prime backup targets

Providing a user with a history of an intruder’s activities by looking through archived or older backups.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?