
Cyber Threat Management (Check Point Exam #2)
Authored by Jeff Graus
Information Technology (IT)
10th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of data would be considered an example of volatile data?
temp files
web browser cache
memory registers
log files
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Keeping data backups offsite is an example of which type of disaster recovery control?
preventive
corrective
detective
management
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which NIST-defined incident response stakeholder is responsible for coordinating incident response with other stakeholders and minimizing the damage of an incident?
management
IT support
the legal department
human resources
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of exercise interrupts services to verify that all aspects of a business continuity plan are able to respond to a certain type of incident?
Tabletop exercise
Functional test
Operational exercise
5.
MATCH QUESTION
30 sec • 1 pt
Match the intrusion event defined in the Diamond Model of intrusion to the description.
victim
the target of the attack
capability
the parties responsible for the intrusion
adversary
network path used to establish and maintain command and control
infrastructure
a tool or technique used to attack the victim
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a chain of custody?
the disciplinary measures an organization may perform if an incident is caused by an employee
the documentation surrounding the preservation of evidence related to an incident
a plan ensuring that each party involved in an incident response understands how to collect evidence
a list of all of the stakeholders that were exploited by an attacker
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the Cyber Kill Chain model, after a weapon is delivered to a targeted system, what is the next step that a threat actor would take?
installation
action on objectives
exploitation
weaponization
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?