Incident Response Plans

Incident Response Plans

University

30 Qs

quiz-placeholder

Similar activities

UNIT 3 LO4 quiz

UNIT 3 LO4 quiz

4th Grade - University

30 Qs

Graph Data Structure - 01

Graph Data Structure - 01

University

26 Qs

CO2517

CO2517

University

25 Qs

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

Computer Incident Response Quiz

Computer Incident Response Quiz

University

25 Qs

Understanding Cyber Security Fundamentals

Understanding Cyber Security Fundamentals

University

28 Qs

CISSP CH2 Asset Security

CISSP CH2 Asset Security

University

34 Qs

A+402 - Storage Troubleshooting

A+402 - Storage Troubleshooting

10th Grade - University

35 Qs

Incident Response Plans

Incident Response Plans

Assessment

Quiz

Computers

University

Easy

Created by

Aras Haji

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the first step in an incident response plan?

Containment

Identification

Recovery

Post-incident review

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal during the containment phase of incident response?

To notify the public

To prevent further damage

To restore all systems immediately

To analyse the root cause

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an indicator of compromise?

A scheduled software update

Unusual outbound network traffic

Regular user login

Approved software installation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a post-incident review?

To assign blame

To improve future response

To delete evidence

To increase system downtime

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who should be included in the communication plan during a major incident?

Only the IT team

All relevant stakeholders

Only external vendors

Only customers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a typical containment strategy?

Disconnecting affected devices from the network

Isolating compromised accounts

Ignoring the incident

Blocking malicious IP addresses

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During incident identification, which tool is commonly used to detect unauthorised access?

Word processor

Intrusion Detection System (IDS)

Spreadsheet software

Printer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?