Search Header Logo

Cyber Threat Management (Check Point Exam #2)

Authored by Jeff Graus

Information Technology (IT)

10th Grade

Used 2+ times

Cyber Threat Management (Check Point Exam #2)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of data would be considered an example of volatile data?

temp files

web browser cache

memory registers

log files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keeping data backups offsite is an example of which type of disaster recovery control?

preventive

corrective

detective

management

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which NIST-defined incident response stakeholder is responsible for coordinating incident response with other stakeholders and minimizing the damage of an incident?

management

IT support

the legal department

human resources

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of exercise interrupts services to verify that all aspects of a business continuity plan are able to respond to a certain type of incident?

Tabletop exercise

Functional test

Operational exercise

5.

MATCH QUESTION

30 sec • 1 pt

Match the intrusion event defined in the Diamond Model of intrusion to the description.

victim

the target of the attack

capability

the parties responsible for the intrusion

adversary

network path used to establish and maintain command and control

infrastructure

a tool or technique used to attack the victim

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a chain of custody?

the disciplinary measures an organization may perform if an incident is caused by an employee

the documentation surrounding the preservation of evidence related to an incident

a plan ensuring that each party involved in an incident response understands how to collect evidence

a list of all of the stakeholders that were exploited by an attacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Cyber Kill Chain model, after a weapon is delivered to a targeted system, what is the next step that a threat actor would take?

installation

action on objectives

exploitation

weaponization

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?