Incident Management 1

Incident Management 1

Professional Development

15 Qs

quiz-placeholder

Similar activities

HR Sept 19

HR Sept 19

Professional Development

20 Qs

Incident Management Quiz

Incident Management Quiz

Professional Development

12 Qs

Awareness ISO 20000-1: 2018

Awareness ISO 20000-1: 2018

Professional Development

10 Qs

Process of Security Design

Process of Security Design

Professional Development

10 Qs

ECO Cyber Security Scavenger Hunt

ECO Cyber Security Scavenger Hunt

Professional Development

10 Qs

Agile & Scrum Quiz

Agile & Scrum Quiz

Professional Development

15 Qs

Cyber Security New

Cyber Security New

Professional Development

15 Qs

University of Canberra College - Sri Lanka Workshop

University of Canberra College - Sri Lanka Workshop

Professional Development

10 Qs

Incident Management 1

Incident Management 1

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Elankayer Sithirasenan

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three core principles that information security incidents threaten?

Confidentiality, detection, and governance

Integrity, availability, and confidentiality

Resilience, incident response, and governance

Detection, response, and recovery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which function in the NIST CSF 2.0 model involves restoring services and learning from incidents?

Identify

Respond

Protect

Recover

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the SOCI Act, who must report cyber security incidents?

Every employee of a government department

Critical infrastructure owners and operators

Internet service providers

Vendors of consumer-grade software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Business Continuity in a Box, provided by the ACSC?

A software tool for encrypting communication channels

A legal framework for reporting ransomware payments

A resource to help organisations restore communications and business services during a cyber incident

A mobile app for alerting the Australian Signals Directorate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one recommended way to manage cyber supply chain risk?

Allow suppliers unrestricted access to internal networks

Avoid sharing incident reports with suppliers

Outsource cyber security training to third parties

Evaluate the cyber security posture and access level of third-party vendors

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one benefit of conducting a post-incident review?

It delays business recovery

It helps document and improve future responses

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Australian Act requires reporting of ransomware payments for large businesses?

Cyber Privacy Act 2020

SOCI Act

Cyber Security Act 2024

Information Systems Act

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?