Search Header Logo

Cybersecurity Core Functions-QUIZ

Authored by Christopher Lynch

Information Technology (IT)

Professional Development

Cybersecurity Core Functions-QUIZ
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

RESPONSE: What are the key steps in an effective response plan?

Identify the threat, assess the impact, develop a strategy, implement the plan, review and revise

Identify the threat, plan for impact, develop a strategy, implement the plan, review and revise

Identify the threat, assess the impact, develop a strategy, implement the plan

Identify the threat, assess the impact, develop a strategy, plan, review and revise

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

IDENTITY: The five core functions of the NIST Cybersecurity Framework are:

Prepare, Prevent, Respond, Mitigate, Restore

Identify, Protect, Detect, Respond, Recover

Plan, Execute, Monitor, Control, Close

Assess, Implement, Evaluate, Report, Improve

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The purpose of a risk assessment in the Identify function is to:

Identify potential risks and vulnerabilities.

Identify who is responsible

Recover from security breaches.

Respond to security incidents.

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

PROTECT: What are the key security measures in the Protect function of NIST?

Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology

Risk Assessment, Risk Management Strategy, Supply Chain Risk Management

Protecting from Anomalies and Events, through Continuous Monitoring, Detection Processes

Response Planning, Communications, Analysis, Mitigation, Improvements

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

IDENTIFY: Why is asset management critical in the Identify function of NIST?

Asset management helps in identifying and managing cybersecurity risks to systems, people, assets, data, and capabilities.

Asset management is critical to the Recovery function of NIST.

Asset management only deals with allocating financial assets properly

Asset management is only about maintaining an monitoring the inventory of assets.

6.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

The purpose of forensic analysis in the response process is to:

usually useless to solving the problem

Identify the cause of a security breach

improve the ability to repel a similar future attack

Improve the time it takes to shutdown a network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The primary goal of the Detect function in the NIST framework is to:

Identify cybersecurity events in a timely manner

Protect data from unauthorized access

Respond to detected cybersecurity events

Recover from cybersecurity incidents

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?