Cybersecurity Core Functions-QUIZ

Cybersecurity Core Functions-QUIZ

Professional Development

27 Qs

quiz-placeholder

Similar activities

BTUI'24 - Inter-school ICT Quiz - Preliminary Round

BTUI'24 - Inter-school ICT Quiz - Preliminary Round

Professional Development

30 Qs

Xfinity Mobile Quiz

Xfinity Mobile Quiz

Professional Development

23 Qs

Optimizing BigTable Performance

Optimizing BigTable Performance

Professional Development

25 Qs

Social Engineering Cydex

Social Engineering Cydex

Professional Development

23 Qs

CSF Additional Quiz - Chapter 1

CSF Additional Quiz - Chapter 1

Professional Development

22 Qs

IBM-Gathering

IBM-Gathering

Professional Development

26 Qs

SOC Analyst

SOC Analyst

Professional Development

25 Qs

Chapter-1- Introduction to Web Development

Chapter-1- Introduction to Web Development

Professional Development

25 Qs

Cybersecurity Core Functions-QUIZ

Cybersecurity Core Functions-QUIZ

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Christopher Lynch

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

RESPONSE: What are the key steps in an effective response plan?

Identify the threat, assess the impact, develop a strategy, implement the plan, review and revise

Identify the threat, plan for impact, develop a strategy, implement the plan, review and revise

Identify the threat, assess the impact, develop a strategy, implement the plan

Identify the threat, assess the impact, develop a strategy, plan, review and revise

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

IDENTITY: The five core functions of the NIST Cybersecurity Framework are:

Prepare, Prevent, Respond, Mitigate, Restore

Identify, Protect, Detect, Respond, Recover

Plan, Execute, Monitor, Control, Close

Assess, Implement, Evaluate, Report, Improve

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The purpose of a risk assessment in the Identify function is to:

Identify potential risks and vulnerabilities.

Identify who is responsible

Recover from security breaches.

Respond to security incidents.

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

PROTECT: What are the key security measures in the Protect function of NIST?

Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology

Risk Assessment, Risk Management Strategy, Supply Chain Risk Management

Protecting from Anomalies and Events, through Continuous Monitoring, Detection Processes

Response Planning, Communications, Analysis, Mitigation, Improvements

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

IDENTIFY: Why is asset management critical in the Identify function of NIST?

Asset management helps in identifying and managing cybersecurity risks to systems, people, assets, data, and capabilities.

Asset management is critical to the Recovery function of NIST.

Asset management only deals with allocating financial assets properly

Asset management is only about maintaining an monitoring the inventory of assets.

6.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

The purpose of forensic analysis in the response process is to:

usually useless to solving the problem

Identify the cause of a security breach

improve the ability to repel a similar future attack

Improve the time it takes to shutdown a network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The primary goal of the Detect function in the NIST framework is to:

Identify cybersecurity events in a timely manner

Protect data from unauthorized access

Respond to detected cybersecurity events

Recover from cybersecurity incidents

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?