You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)
#02 Incident Response, BC, and DR Concepts

Quiz
•
Computers
•
Professional Development
•
Easy
Kim undefined
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
emergency
event
policy
disaster
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)
risk management
incident detection
malware
disaster
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)
exploit
intrusion
event
malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)
malware
critical
fractal
zero-day
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False? The IT department is responsible for creating the organization's business continuity plan. (D2, L2.2.1)
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)
business
technical
IT
financial
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)
guard dogs
data backups
contract personnel
anti-malware solutions
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
14 questions
isc2 sample questions

Quiz
•
Professional Development
10 questions
IT General Control

Quiz
•
Professional Development
15 questions
Sec+ Quiz - 2

Quiz
•
Professional Development
11 questions
KUIZ TEROKAI PORTAL DELIMA

Quiz
•
Professional Development
12 questions
Sécurité 2 - Attaques et piratage 1

Quiz
•
Professional Development
15 questions
Microsoft Excel

Quiz
•
Professional Development
10 questions
GUESS THAT WORD IN CYBER!

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade