Search Header Logo

Cybersecurity Incident Response Worksheet (Grade 12)

Authored by Maddy Burnett

Information Technology (IT)

12th Grade

Used 4+ times

Cybersecurity Incident Response Worksheet (Grade 12)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ is the stage in the cyber kill chain that includes the activation and initiation of the process whereby the crafted exploit gains a foothold and attempts to expand its influence.

Weaponization

Exploitation

Delivery

Reconnaissance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The job functions and organizational roles of ___ focus on protecting the organization's information systems and stored information from attacks.

network engineering teams

information security management and professionals

physical security personnel

software development groups

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ___ CSIRT model is used when the organization needs a full-time, on-site CSIRT but does not have enough available, qualified employees.

centralized

partially outsourced

distributed

virtual

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The C.I.A. triad is the industry standard for computer security since the development of the mainframe and is based on three characteristics that describe the utility of information.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A structured walk-through is the CP testing strategy in which the organization conducts a role-playing exercise as if an actual incident or disaster had occurred.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Event correlation involves examining logs from multiple systems and identifying trends or indicators of attacks across those multiple systems.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A series of steps that follow the stages of a cyberattack from early reconnaissance to the exfiltration of data is known as the ___.

cyber kill chain

threat matrix

attack surface

zero-trust model

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?