CSIRP Training

CSIRP Training

Professional Development

10 Qs

quiz-placeholder

Similar activities

CS Assessment #1

CS Assessment #1

Professional Development

10 Qs

AWS Amazon VPC

AWS Amazon VPC

Professional Development

10 Qs

All TechEd Up

All TechEd Up

Professional Development

10 Qs

Daisy Kickoff Quiz

Daisy Kickoff Quiz

Professional Development

13 Qs

quality assessment

quality assessment

Professional Development

11 Qs

Post Test Road to Digital vol.2

Post Test Road to Digital vol.2

Professional Development

10 Qs

orthopedics

orthopedics

Professional Development

12 Qs

Quiz Microsite

Quiz Microsite

Professional Development

10 Qs

CSIRP Training

CSIRP Training

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Easy

Created by

Risk MTB

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What is CSIRP stands for?

Cyber Security Incident Response Plan

Cyber Security Incident Regulatory Plan

Cyber Security Incident Risk Plan

Cyber Security Immediate Response Plan

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Your business email account has been compromised and leaked. What is the first course of action?

Nothing, it is a responsibility of Group IT

Change your Outlook password immediately

Inform the security team of your organization

Change the Password on all sites where you use the same password and inform the IT Team

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which one is NOT a good password ​management practice?

Use alphanumeric characters in the password

Re-use the password for easy to memorize

Avoid using keyword that can be associated with your ID

Use a long passphrase

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What do you need to do if you see any security incident, abnormalities, or non-compliant behaviour?

Tell the vendors

Keep it secret

Report to Group IT and Incident Response Team ("IRT")

Post in social media

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Fake e-mail message appearing to be from a trusted business, social network or other contact asks for personal information or requests a user to click on a link or attachment so that hackers can secretly collect personal information and data. This act is called?

Ransomware

Inside Threats

Phishing

Advances persistent Threats

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

How does malware get onto your computer?

Email attachments or links

By visiting unreliable websites

On USB sticks

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Who should know your passwords?

You & Group IT

You & Senior Management

Anyone

Only You

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?