Cybersecurity Core Functions-QUIZ

Quiz
•
Information Technology (IT)
•
Professional Development
•
Hard
Christopher Lynch
FREE Resource
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
RESPONSE: What are the key steps in an effective response plan?
Identify the threat, assess the impact, develop a strategy, implement the plan, review and revise
Identify the threat, plan for impact, develop a strategy, implement the plan, review and revise
Identify the threat, assess the impact, develop a strategy, implement the plan
Identify the threat, assess the impact, develop a strategy, plan, review and revise
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
IDENTITY: The five core functions of the NIST Cybersecurity Framework are:
Prepare, Prevent, Respond, Mitigate, Restore
Identify, Protect, Detect, Respond, Recover
Plan, Execute, Monitor, Control, Close
Assess, Implement, Evaluate, Report, Improve
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The purpose of a risk assessment in the Identify function is to:
Identify potential risks and vulnerabilities.
Identify who is responsible
Recover from security breaches.
Respond to security incidents.
4.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
PROTECT: What are the key security measures in the Protect function of NIST?
Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology
Risk Assessment, Risk Management Strategy, Supply Chain Risk Management
Protecting from Anomalies and Events, through Continuous Monitoring, Detection Processes
Response Planning, Communications, Analysis, Mitigation, Improvements
5.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
IDENTIFY: Why is asset management critical in the Identify function of NIST?
Asset management helps in identifying and managing cybersecurity risks to systems, people, assets, data, and capabilities.
Asset management is critical to the Recovery function of NIST.
Asset management only deals with allocating financial assets properly
Asset management is only about maintaining an monitoring the inventory of assets.
6.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
The purpose of forensic analysis in the response process is to:
usually useless to solving the problem
Identify the cause of a security breach
improve the ability to repel a similar future attack
Improve the time it takes to shutdown a network.
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The primary goal of the Detect function in the NIST framework is to:
Identify cybersecurity events in a timely manner
Protect data from unauthorized access
Respond to detected cybersecurity events
Recover from cybersecurity incidents
Create a free account and access millions of resources
Similar Resources on Wayground
29 questions
Cyber Segurança - 03

Quiz
•
Professional Development
25 questions
Quiz de JavaScript Básico

Quiz
•
Professional Development
26 questions
IBM-Gathering

Quiz
•
Professional Development
30 questions
Quiz

Quiz
•
Professional Development
30 questions
BTUI'24 - Inter-school ICT Quiz - Preliminary Round

Quiz
•
Professional Development
25 questions
Social Media in School Library

Quiz
•
Professional Development
30 questions
M3: Data Analysis and Cloud Computing - Grammar

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade