Cybersecurity Core Functions-QUIZ

Quiz
•
Information Technology (IT)
•
Professional Development
•
Hard
Christopher Lynch
FREE Resource
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
RESPONSE: What are the key steps in an effective response plan?
Identify the threat, assess the impact, develop a strategy, implement the plan, review and revise
Identify the threat, plan for impact, develop a strategy, implement the plan, review and revise
Identify the threat, assess the impact, develop a strategy, implement the plan
Identify the threat, assess the impact, develop a strategy, plan, review and revise
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
IDENTITY: The five core functions of the NIST Cybersecurity Framework are:
Prepare, Prevent, Respond, Mitigate, Restore
Identify, Protect, Detect, Respond, Recover
Plan, Execute, Monitor, Control, Close
Assess, Implement, Evaluate, Report, Improve
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The purpose of a risk assessment in the Identify function is to:
Identify potential risks and vulnerabilities.
Identify who is responsible
Recover from security breaches.
Respond to security incidents.
4.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
PROTECT: What are the key security measures in the Protect function of NIST?
Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology
Risk Assessment, Risk Management Strategy, Supply Chain Risk Management
Protecting from Anomalies and Events, through Continuous Monitoring, Detection Processes
Response Planning, Communications, Analysis, Mitigation, Improvements
5.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
IDENTIFY: Why is asset management critical in the Identify function of NIST?
Asset management helps in identifying and managing cybersecurity risks to systems, people, assets, data, and capabilities.
Asset management is critical to the Recovery function of NIST.
Asset management only deals with allocating financial assets properly
Asset management is only about maintaining an monitoring the inventory of assets.
6.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
The purpose of forensic analysis in the response process is to:
usually useless to solving the problem
Identify the cause of a security breach
improve the ability to repel a similar future attack
Improve the time it takes to shutdown a network.
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The primary goal of the Detect function in the NIST framework is to:
Identify cybersecurity events in a timely manner
Protect data from unauthorized access
Respond to detected cybersecurity events
Recover from cybersecurity incidents
Create a free account and access millions of resources
Similar Resources on Wayground
28 questions
Tableau Quiz

Quiz
•
Professional Development
22 questions
Information Security Controls Quiz

Quiz
•
Professional Development
22 questions
CSF Additional Quiz - Chapter 1

Quiz
•
Professional Development
25 questions
SOC Analyst

Quiz
•
Professional Development
25 questions
DCP Utilization and Maintenance

Quiz
•
Professional Development
30 questions
Information Security Awareness Training Quiz

Quiz
•
Professional Development
25 questions
Chapter-1- Introduction to Web Development

Quiz
•
Professional Development
25 questions
cryptography

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade