#02 Incident Response, BC, and DR Concepts

Quiz
•
Computers
•
Professional Development
•
Easy
Kim undefined
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)
emergency
event
policy
disaster
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)
risk management
incident detection
malware
disaster
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)
exploit
intrusion
event
malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)
malware
critical
fractal
zero-day
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False? The IT department is responsible for creating the organization's business continuity plan. (D2, L2.2.1)
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)
business
technical
IT
financial
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)
guard dogs
data backups
contract personnel
anti-malware solutions
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Presentación Cybersecurity

Quiz
•
Professional Development
9 questions
Sayısal Tasarım - Shift Registers

Quiz
•
University - Professi...
10 questions
IT ENGLISH: Research Project Topics - Database Administration

Quiz
•
Professional Development
10 questions
Atividade - UC Tecnologia :D

Quiz
•
Professional Development
15 questions
Super Tech Challange

Quiz
•
Professional Development
12 questions
Sécurité 2 - Attaques et piratage 1

Quiz
•
Professional Development
10 questions
GUESS THAT WORD IN CYBER!

Quiz
•
Professional Development
8 questions
Advanced Persistent Threat

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade