Search Header Logo

Incident Management 1

Authored by Elankayer Sithirasenan

Professional Development

Professional Development

Used 1+ times

Incident Management 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three core principles that information security incidents threaten?

Confidentiality, detection, and governance

Integrity, availability, and confidentiality

Resilience, incident response, and governance

Detection, response, and recovery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which function in the NIST CSF 2.0 model involves restoring services and learning from incidents?

Identify

Respond

Protect

Recover

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the SOCI Act, who must report cyber security incidents?

Every employee of a government department

Critical infrastructure owners and operators

Internet service providers

Vendors of consumer-grade software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Business Continuity in a Box, provided by the ACSC?

A software tool for encrypting communication channels

A legal framework for reporting ransomware payments

A resource to help organisations restore communications and business services during a cyber incident

A mobile app for alerting the Australian Signals Directorate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one recommended way to manage cyber supply chain risk?

Allow suppliers unrestricted access to internal networks

Avoid sharing incident reports with suppliers

Outsource cyber security training to third parties

Evaluate the cyber security posture and access level of third-party vendors

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one benefit of conducting a post-incident review?

It delays business recovery

It helps document and improve future responses

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Australian Act requires reporting of ransomware payments for large businesses?

Cyber Privacy Act 2020

SOCI Act

Cyber Security Act 2024

Information Systems Act

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?