
Manage Security Risks: Quiz 7
Authored by John Coder
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The first phase is pre________________. Organizations must prepare to mitigate the likelihood, risk, and impact of a security incident by documenting procedures, establishing staffing plans, and educating users. pre________________ sets the foundation for successful incident response. For example, organizations can create incident response plans and procedures that outline the roles and responsibilities of each security team member.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The second phase is det___________ and ana___________. The objective of this phase is to detect and analyze events using defined processes and technology. Using appropriate tools and strategies during this phase helps security analysts determine whether a breach has occurred and analyze its possible magnitude.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The fifth phase is po_______-incident activity. This phase includes documenting the incident, informing organizational leadership, and applying lessons learned to ensure that an organization is better prepared to handle future incidents. Depending on the severity of the incident, organizations can conduct a full-scale incident analysis to determine the root cause of the incident and implement various updates or improvements to enhance its overall security posture.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The third phase is conta___________. The goal of conta___________ is to prevent further damage and reduce the immediate impact of a security incident. During this phase, security professionals take actions to contain an incident and minimize damage. conta___________ is a high priority for organizations because it helps prevent ongoing risks to critical assets and data.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Playbooks sometimes cover specific incidents and vulner___________. These might include ransomware, vishing, business email compromise (BEC), and other attacks previously discussed. Incident and vulnerability response playbooks are very common, but they are not the only types of playbooks organizations develop.
Each organization has a different set of playbook tools, methodologies, protocols, and procedures that they adhere to, and different individuals are involved at each step of the response process, depending on the country they are in. For example, incident notification requirements from government-imposed laws and regulations, along with compliance standards, affect the content in the playbooks. These requirements are subject to change based on where the incident originated and the type of data affected.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The fourth phase in an incident response playbook is erad___________ and rec___________. This phase involves the complete removal of an incident's artifacts so that an organization can return to normal operations. During this phase, security professionals eliminate artifacts of the incident by removing malicious code and mitigating vulnerabilities. Once they've exercised due diligence, they can begin to restore the affected environment to a secure state. This is also known as IT restoration.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The sixth and final phase in an incident response playbook is coordination. coor__________ involves reporting incidents and sharing information, throughout the incident response process, based on the organization's established standards. coor__________ is important for many reasons. It ensures that organizations meet compliance requirements and it allows for coor__________ response and resolution.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
BASIC OF COMPUTER
Quiz
•
Professional Development
10 questions
Web Browsing
Quiz
•
10th Grade - Professi...
10 questions
SUBMARINE LIFE
Quiz
•
10th Grade - Professi...
10 questions
Introduction to Hyperconverged: HCI 101
Quiz
•
Professional Development
10 questions
Python-Quiz-Basic-Datatypes
Quiz
•
12th Grade - Professi...
10 questions
ER Model
Quiz
•
Professional Development
10 questions
Software Security
Quiz
•
University - Professi...
10 questions
C Programming
Quiz
•
Professional Development
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
44 questions
Would you rather...
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
14 questions
Valentine's Day Trivia!
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development