#02 Incident Response, BC, and DR Concepts

#02 Incident Response, BC, and DR Concepts

Professional Development

10 Qs

quiz-placeholder

Similar activities

SEC+ Ch.11 Review Test

SEC+ Ch.11 Review Test

Professional Development

15 Qs

SEC+ Ch.9 Review Test

SEC+ Ch.9 Review Test

Professional Development

15 Qs

Type of Attack Indicators

Type of Attack Indicators

Professional Development

10 Qs

CCIE overview

CCIE overview

Professional Development

15 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

Professional Development

15 Qs

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

Professional Development

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Professional Development

15 Qs

#02 Incident Response, BC, and DR Concepts

#02 Incident Response, BC, and DR Concepts

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Kim undefined

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)

emergency

event

policy

disaster

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)

risk management

incident detection

malware

disaster

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)

exploit

intrusion

event

malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)

malware

critical

fractal

zero-day

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? The IT department is responsible for creating the organization's business continuity plan. (D2, L2.2.1)

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)

business

technical

IT

financial

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)

guard dogs

data backups

contract personnel

anti-malware solutions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?