Cybersecurity Core Functions-QUIZ

Cybersecurity Core Functions-QUIZ

Professional Development

27 Qs

quiz-placeholder

Similar activities

MCyber_Chap22N23

MCyber_Chap22N23

Professional Development

22 Qs

JS-QUIZ

JS-QUIZ

Professional Development

25 Qs

SAA-C03) - Módulos: 10 (Rede-2) e 11 (Sem servidor)

SAA-C03) - Módulos: 10 (Rede-2) e 11 (Sem servidor)

Professional Development

25 Qs

CLF-C02 - Sim. 28 Questões Semana 3 - AWS Cloud Pratiticioner

CLF-C02 - Sim. 28 Questões Semana 3 - AWS Cloud Pratiticioner

Professional Development

28 Qs

Modelos 0SI e TCP

Modelos 0SI e TCP

Professional Development

30 Qs

ලංකා බ ංකුවේ මාණ්ඩලික සහකාර  01  තනතුරට නිලධාරීන් බඳවා  ග නීවේ ත

ලංකා බ ංකුවේ මාණ්ඩලික සහකාර 01 තනතුරට නිලධාරීන් බඳවා ග නීවේ ත

Professional Development

23 Qs

Quiz sobre Manutenção Mecânica

Quiz sobre Manutenção Mecânica

Professional Development

22 Qs

Understanding Trojans in Computer Security

Understanding Trojans in Computer Security

Professional Development

22 Qs

Cybersecurity Core Functions-QUIZ

Cybersecurity Core Functions-QUIZ

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Christopher Lynch

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

RESPONSE: What are the key steps in an effective response plan?

Identify the threat, assess the impact, develop a strategy, implement the plan, review and revise

Identify the threat, plan for impact, develop a strategy, implement the plan, review and revise

Identify the threat, assess the impact, develop a strategy, implement the plan

Identify the threat, assess the impact, develop a strategy, plan, review and revise

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

IDENTITY: The five core functions of the NIST Cybersecurity Framework are:

Prepare, Prevent, Respond, Mitigate, Restore

Identify, Protect, Detect, Respond, Recover

Plan, Execute, Monitor, Control, Close

Assess, Implement, Evaluate, Report, Improve

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The purpose of a risk assessment in the Identify function is to:

Identify potential risks and vulnerabilities.

Identify who is responsible

Recover from security breaches.

Respond to security incidents.

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

PROTECT: What are the key security measures in the Protect function of NIST?

Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology

Risk Assessment, Risk Management Strategy, Supply Chain Risk Management

Protecting from Anomalies and Events, through Continuous Monitoring, Detection Processes

Response Planning, Communications, Analysis, Mitigation, Improvements

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

IDENTIFY: Why is asset management critical in the Identify function of NIST?

Asset management helps in identifying and managing cybersecurity risks to systems, people, assets, data, and capabilities.

Asset management is critical to the Recovery function of NIST.

Asset management only deals with allocating financial assets properly

Asset management is only about maintaining an monitoring the inventory of assets.

6.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

The purpose of forensic analysis in the response process is to:

usually useless to solving the problem

Identify the cause of a security breach

improve the ability to repel a similar future attack

Improve the time it takes to shutdown a network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The primary goal of the Detect function in the NIST framework is to:

Identify cybersecurity events in a timely manner

Protect data from unauthorized access

Respond to detected cybersecurity events

Recover from cybersecurity incidents

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?