Cybersecurity Core Functions-IR TEAM

Cybersecurity Core Functions-IR TEAM

Professional Development

90 Qs

quiz-placeholder

Similar activities

ISACA IT Risk Fundamentals: Practice Exam #1

ISACA IT Risk Fundamentals: Practice Exam #1

Professional Development

87 Qs

AWS Certified Cloud Practitioner - IAM, Compute, and Storage

AWS Certified Cloud Practitioner - IAM, Compute, and Storage

Professional Development

86 Qs

CISA Domain 1

CISA Domain 1

Professional Development

93 Qs

Training map

Training map

Professional Development

95 Qs

Cybersecurity Core Functions-IR TEAM

Cybersecurity Core Functions-IR TEAM

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Easy

Created by

Christopher Lynch

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

90 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

CIA, an acronym for cybersecurity, determines when to escalate a cyber event to cyber incident. What does is stand for?

Counter

Intelligence

Agency

Compromise

infiltrate

Access

Confidentiality

Integrity

Availablilty

Corporate

Internal

Access controls

2.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

What does WISP stand for?

Wireless Internet Service Provider

Wide Internet Service Protocol

Wiritten information Security plan

Wide Information Service Provider

3.

REORDER QUESTION

3 mins • 6 pts

You have a confirmed CIA incident. Correctly order the Response Plan :

document all response measures taken

Initiate IR team communications logging

preserve evidence

determine origin, examine all logs with SOC

Start Response Log

Answer explanation

The NIST Cybersecurity Framework (CSF) 2.0 focuses on the Respond function to develop and implement actions against detected cybersecurity incidents, ensuring effective response planning, communication, and mitigation efforts. It supports organizations in managing cybersecurity events by providing a framework for planning, analyzing, and communicating incident-related actions. 

Key aspects of the Respond function in NIST CSF 2.0:

  • Response Planning:

    Organizations should develop and maintain a comprehensive incident response plan that outlines procedures for handling various cybersecurity incidents. 

  • Communication:

    Effective communication is crucial for coordinating internal and external stakeholders during an incident response. 

  • Analysis:

    Analyzing incidents helps organizations understand the nature of the threat, its impact, and potential root causes. 

  • Mitigation:

    Mitigation efforts involve taking actions to contain the impact of the incident and prevent further damage. 

  • Improvements:

    Post-incident review and analysis should inform future improvements in response planning and incident response processes. 

  • Incident Management:

    The Respond function includes a specific category focused on incident management, covering various aspects of responding to and resolving incidents. 

  • Evidence Preservation:

    Maintaining evidence for forensic examination and potential legal needs is a crucial aspect of the Respond function. 

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What are the key security measures in the Protect function of NIST?

Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology

Risk Assessment, Risk Management Strategy, Supply Chain Risk Management

Anomalies and Events, Security Continuous Monitoring, Detection Processes

Response Planning, Communications, Analysis, Mitigation, Improvements

5.

REORDER QUESTION

3 mins • 5 pts

"Ground zero" has been identified and neutralized.

Please order the objectives of Phase 4 "Response" to Cyber Incident

Update and complete the Incident Summary Report (ISR)

Remediation: deploy devices cleared for use. begin cleaning affected devices

Creating a secured and safe channel to restore external communications

Begin prioritized restoration of mission critical services

Complete restoration of network functionality

6.

MATCH QUESTION

3 mins • 5 pts

Match the Log with the Correct Phase of an Incident response

Response Log

Phase 5

Post Incident Review Log

Phase 1

Threat Level assessment

Phase 3

Event Report

Phase 4

Restore functionality of Critical System

Phase 2

7.

REORDER QUESTION

2 mins • 2 pts

Put the content in order as it would be included in a public communication regarding a breach

Incident Description
Actions Taken
Communication and Support
Affected Data
Transparency and Accountability

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?