RESPONSE: What are the key steps in an effective response plan?
Cybersecurity Core Functions-QUIZ

Quiz
•
Information Technology (IT)
•
Professional Development
•
Hard
Christopher Lynch
FREE Resource
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Identify the threat, assess the impact, develop a strategy, implement the plan, review and revise
Identify the threat, plan for impact, develop a strategy, implement the plan, review and revise
Identify the threat, assess the impact, develop a strategy, implement the plan
Identify the threat, assess the impact, develop a strategy, plan, review and revise
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
IDENTITY: The five core functions of the NIST Cybersecurity Framework are:
Prepare, Prevent, Respond, Mitigate, Restore
Identify, Protect, Detect, Respond, Recover
Plan, Execute, Monitor, Control, Close
Assess, Implement, Evaluate, Report, Improve
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The purpose of a risk assessment in the Identify function is to:
Identify potential risks and vulnerabilities.
Identify who is responsible
Recover from security breaches.
Respond to security incidents.
4.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
PROTECT: What are the key security measures in the Protect function of NIST?
Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology
Risk Assessment, Risk Management Strategy, Supply Chain Risk Management
Protecting from Anomalies and Events, through Continuous Monitoring, Detection Processes
Response Planning, Communications, Analysis, Mitigation, Improvements
5.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
IDENTIFY: Why is asset management critical in the Identify function of NIST?
Asset management helps in identifying and managing cybersecurity risks to systems, people, assets, data, and capabilities.
Asset management is critical to the Recovery function of NIST.
Asset management only deals with allocating financial assets properly
Asset management is only about maintaining an monitoring the inventory of assets.
6.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
The purpose of forensic analysis in the response process is to:
usually useless to solving the problem
Identify the cause of a security breach
improve the ability to repel a similar future attack
Improve the time it takes to shutdown a network.
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The primary goal of the Detect function in the NIST framework is to:
Identify cybersecurity events in a timely manner
Protect data from unauthorized access
Respond to detected cybersecurity events
Recover from cybersecurity incidents
Create a free account and access millions of resources
Similar Resources on Quizizz
23 questions
Social Engineering Cydex

Quiz
•
Professional Development
29 questions
Cyber Segurança - 03

Quiz
•
Professional Development
24 questions
AZ-500 Final quiz GSI

Quiz
•
Professional Development
28 questions
ISC3 - Domain 3 - Access Control Concepts

Quiz
•
Professional Development
30 questions
CCSA-2

Quiz
•
Professional Development
30 questions
Quiz Pemrograman Web

Quiz
•
Professional Development
26 questions
IBM-Gathering

Quiz
•
Professional Development
30 questions
BTUI'24 - Inter-school ICT Quiz - Preliminary Round

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade