Incident Response Plans

Incident Response Plans

University

30 Qs

quiz-placeholder

Similar activities

week 6 workshop quiz for sec+

week 6 workshop quiz for sec+

University - Professional Development

25 Qs

Cybersecurity Fundamentals Practice Quiz

Cybersecurity Fundamentals Practice Quiz

University

25 Qs

Chapters 13 and 14 IT Automation Review

Chapters 13 and 14 IT Automation Review

University

25 Qs

Information Assurance and Security Finals Long Test

Information Assurance and Security Finals Long Test

University

30 Qs

KV5041 Intro Quiz

KV5041 Intro Quiz

University

25 Qs

X-Basic Security Awareness

X-Basic Security Awareness

University

30 Qs

ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

University

28 Qs

ISC2 - CC - Chapter 1 - Module 4

ISC2 - CC - Chapter 1 - Module 4

University

26 Qs

Incident Response Plans

Incident Response Plans

Assessment

Quiz

Computers

University

Easy

Created by

Aras Haji

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the first step in an incident response plan?

Containment

Identification

Recovery

Post-incident review

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal during the containment phase of incident response?

To notify the public

To prevent further damage

To restore all systems immediately

To analyse the root cause

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an indicator of compromise?

A scheduled software update

Unusual outbound network traffic

Regular user login

Approved software installation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a post-incident review?

To assign blame

To improve future response

To delete evidence

To increase system downtime

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who should be included in the communication plan during a major incident?

Only the IT team

All relevant stakeholders

Only external vendors

Only customers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a typical containment strategy?

Disconnecting affected devices from the network

Isolating compromised accounts

Ignoring the incident

Blocking malicious IP addresses

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During incident identification, which tool is commonly used to detect unauthorised access?

Word processor

Intrusion Detection System (IDS)

Spreadsheet software

Printer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?