
Incident Response Plans
Authored by Aras Haji
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the first step in an incident response plan?
Containment
Identification
Recovery
Post-incident review
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal during the containment phase of incident response?
To notify the public
To prevent further damage
To restore all systems immediately
To analyse the root cause
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes an indicator of compromise?
A scheduled software update
Unusual outbound network traffic
Regular user login
Approved software installation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of a post-incident review?
To assign blame
To improve future response
To delete evidence
To increase system downtime
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who should be included in the communication plan during a major incident?
Only the IT team
All relevant stakeholders
Only external vendors
Only customers
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a typical containment strategy?
Disconnecting affected devices from the network
Isolating compromised accounts
Ignoring the incident
Blocking malicious IP addresses
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During incident identification, which tool is commonly used to detect unauthorised access?
Word processor
Intrusion Detection System (IDS)
Spreadsheet software
Printer
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?