Cybersecurity Core Functions-QUIZ

Cybersecurity Core Functions-QUIZ

Professional Development

27 Qs

quiz-placeholder

Similar activities

DCP Utilization and Maintenance

DCP Utilization and Maintenance

Professional Development

25 Qs

Information Security Awareness Training Quiz

Information Security Awareness Training Quiz

Professional Development

30 Qs

AWS Basics

AWS Basics

Professional Development

30 Qs

General Knowledge Quiz #2

General Knowledge Quiz #2

Professional Development

25 Qs

Networking and Routing Quiz 1

Networking and Routing Quiz 1

Professional Development

23 Qs

Information Security Controls Quiz

Information Security Controls Quiz

Professional Development

22 Qs

DAMPAK SOSIAL INFORMATIKA

DAMPAK SOSIAL INFORMATIKA

Professional Development

25 Qs

Cybersecurity Core Functions-QUIZ

Cybersecurity Core Functions-QUIZ

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Christopher Lynch

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

RESPONSE: What are the key steps in an effective response plan?

Identify the threat, assess the impact, develop a strategy, implement the plan, review and revise

Identify the threat, plan for impact, develop a strategy, implement the plan, review and revise

Identify the threat, assess the impact, develop a strategy, implement the plan

Identify the threat, assess the impact, develop a strategy, plan, review and revise

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

IDENTITY: The five core functions of the NIST Cybersecurity Framework are:

Prepare, Prevent, Respond, Mitigate, Restore

Identify, Protect, Detect, Respond, Recover

Plan, Execute, Monitor, Control, Close

Assess, Implement, Evaluate, Report, Improve

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The purpose of a risk assessment in the Identify function is to:

Identify potential risks and vulnerabilities.

Identify who is responsible

Recover from security breaches.

Respond to security incidents.

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

PROTECT: What are the key security measures in the Protect function of NIST?

Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology

Risk Assessment, Risk Management Strategy, Supply Chain Risk Management

Protecting from Anomalies and Events, through Continuous Monitoring, Detection Processes

Response Planning, Communications, Analysis, Mitigation, Improvements

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

IDENTIFY: Why is asset management critical in the Identify function of NIST?

Asset management helps in identifying and managing cybersecurity risks to systems, people, assets, data, and capabilities.

Asset management is critical to the Recovery function of NIST.

Asset management only deals with allocating financial assets properly

Asset management is only about maintaining an monitoring the inventory of assets.

6.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

The purpose of forensic analysis in the response process is to:

usually useless to solving the problem

Identify the cause of a security breach

improve the ability to repel a similar future attack

Improve the time it takes to shutdown a network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The primary goal of the Detect function in the NIST framework is to:

Identify cybersecurity events in a timely manner

Protect data from unauthorized access

Respond to detected cybersecurity events

Recover from cybersecurity incidents

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?