Basic Cybersecurity Concepts 1

Basic Cybersecurity Concepts 1

Professional Development

25 Qs

quiz-placeholder

Similar activities

AWS Cloud Foundations - Aula02

AWS Cloud Foundations - Aula02

University - Professional Development

20 Qs

Module 1 - Modern Management

Module 1 - Modern Management

Professional Development

20 Qs

SEC+ set 1

SEC+ set 1

Professional Development

26 Qs

ACSP Apple Exam 2023 v3

ACSP Apple Exam 2023 v3

Professional Development

21 Qs

API Design Basic

API Design Basic

Professional Development

20 Qs

Security Plus 1-02

Security Plus 1-02

Professional Development

20 Qs

AWS Quiz Show 2023 (Week 1)

AWS Quiz Show 2023 (Week 1)

Professional Development

20 Qs

Cyber Policy quiz 3

Cyber Policy quiz 3

Professional Development

25 Qs

Basic Cybersecurity Concepts 1

Basic Cybersecurity Concepts 1

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Isabella S

Used 35+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following steps is required to mitigate data breach risks?

Use strong credentials and disable multi-factor authentication.

Use strong credentials and enable multi-factor authentication.

Reuse passwords, because it is easier that way.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

What is the most common password in 2019 according to NCSC?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CYDEO customers' personal information was breached, what should be done?

Notify customers and let them know about the breach.

Ignore customers and deal with them later.

Not tell anyone about the breach and delay until things are calmed down.

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which of the following should you monitor or include in the SIEM? (select multiple)

Laptops

Antivirus

Servers

Routers

Firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Can SIEM work by itself, or does it need input from other devices?

It works directly with a firewall.

It depends on the company's infrastructure.

It needs input from other devices.

It can work by itself.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would NOT be one of SOAR solutions for your company in case of a ransomware attack?

Automate the steps to be taken once the incident was detected.

Help to collaborate between SOC analysts.

Automatically fix the issue.

Provide a clear path on the escalation process.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which is the correct order of the incident response process steps?

Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned

Lessons Learned, Recovery, Eradication, Containment, Identification, Preparation

Identification, Preparation, Containment, Eradication, Lessons Learned, Recovery

Identification, Preparation, Containment, Eradication, Recovery, Lessons Learned

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?