Cybersecurity Core Functions-QUIZ

Quiz
•
Information Technology (IT)
•
Professional Development
•
Hard
Christopher Lynch
FREE Resource
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
RESPONSE: What are the key steps in an effective response plan?
Identify the threat, assess the impact, develop a strategy, implement the plan, review and revise
Identify the threat, plan for impact, develop a strategy, implement the plan, review and revise
Identify the threat, assess the impact, develop a strategy, implement the plan
Identify the threat, assess the impact, develop a strategy, plan, review and revise
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
IDENTITY: The five core functions of the NIST Cybersecurity Framework are:
Prepare, Prevent, Respond, Mitigate, Restore
Identify, Protect, Detect, Respond, Recover
Plan, Execute, Monitor, Control, Close
Assess, Implement, Evaluate, Report, Improve
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The purpose of a risk assessment in the Identify function is to:
Identify potential risks and vulnerabilities.
Identify who is responsible
Recover from security breaches.
Respond to security incidents.
4.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
PROTECT: What are the key security measures in the Protect function of NIST?
Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology
Risk Assessment, Risk Management Strategy, Supply Chain Risk Management
Protecting from Anomalies and Events, through Continuous Monitoring, Detection Processes
Response Planning, Communications, Analysis, Mitigation, Improvements
5.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
IDENTIFY: Why is asset management critical in the Identify function of NIST?
Asset management helps in identifying and managing cybersecurity risks to systems, people, assets, data, and capabilities.
Asset management is critical to the Recovery function of NIST.
Asset management only deals with allocating financial assets properly
Asset management is only about maintaining an monitoring the inventory of assets.
6.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
The purpose of forensic analysis in the response process is to:
usually useless to solving the problem
Identify the cause of a security breach
improve the ability to repel a similar future attack
Improve the time it takes to shutdown a network.
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The primary goal of the Detect function in the NIST framework is to:
Identify cybersecurity events in a timely manner
Protect data from unauthorized access
Respond to detected cybersecurity events
Recover from cybersecurity incidents
Create a free account and access millions of resources
Similar Resources on Wayground
30 questions
Health Information Ethics Quiz

Quiz
•
Professional Development
25 questions
SAA-C03) - Módulos: 10 (Rede-2) e 11 (Sem servidor)

Quiz
•
Professional Development
31 questions
DP-300 Full MCQ Set

Quiz
•
Professional Development
30 questions
Windows and Azure Security Quiz

Quiz
•
Professional Development
28 questions
CLF-C02 - Sim. 28 Questões Semana 3 - AWS Cloud Pratiticioner

Quiz
•
Professional Development
32 questions
Paid Class Cybersecurity Quiz

Quiz
•
Professional Development
23 questions
Network+ 802.11, cellular, vpn

Quiz
•
Professional Development
25 questions
AWS DVA-C02 Quiz by CAAI

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade