Computer Security Incidents Quiz Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Charlesss
C
Charlesss
Community Contributor
Quizzes Created: 1 | Total Attempts: 8,265
Questions: 15 | Attempts: 8,268

SettingsSettingsSettings
Computer Security Incidents Quiz Questions - Quiz

Do you know about computer security incidents? Check out these quiz questions and answers based on computer security incidents and test your knowledge about the same. Any compromise with the confidentiality, integrity, or availability of an organization's information system is defined as a cybersecurity incident or information security incident. Do you know how to stop the theft of information security? Take up the quiz below and review your understanding of different types of computer security incidents. Good luck!


Questions and Answers
  • 1. 

    Which of the following is true about a computer security incident?

    • A.

      A computer security incident is a threat to policies that are related to computer security.

    • B.

      Threats or violations can be identified by unauthorized access to a system.

    • C.

      A security incident is a warning that there may be a threat to information or computer security. The warning could also be that a threat has already occurred.

    • D.

      None of the above

    Correct Answer
    C. A security incident is a warning that there may be a threat to information or computer security. The warning could also be that a threat has already occurred.
    Explanation
    A computer security incident refers to a situation where there is a potential or actual threat to the security of information or computer systems. It serves as a warning that there may be a threat to the confidentiality, integrity, or availability of data or computer resources. This warning could indicate that a threat is imminent or that a threat has already taken place. Unauthorized access to a system is one way to identify such threats or violations. Therefore, the statement "A security incident is a warning that there may be a threat to information or computer security. The warning could also be that a threat has already occurred" accurately describes a computer security incident.

    Rate this question:

  • 2. 

    Which of the following are the types of computer security incidents?

    • A.

      Malicious code attack

    • B.

      Unauthorized access

    • C.

      Fraud and theft

    • D.

      All of these points

    Correct Answer
    D. All of these points
    Explanation
    Malicious code attacks, fraud and theft, and unauthorized access are all types of computer security incidents.

    Rate this question:

  • 3. 

    Accurately ___ and ___ incidents are the most challenging and essential parts of the incident response process.

    • A.

      Transferring / analyzing

    • B.

      Detecting / assessing

    • C.

      Mitigating / analyzing

    • D.

      All of these options.

    • E.

      Mitigating / analyzing AND Transferring / analyzing are correct.

    Correct Answer
    B. Detecting / assessing
    Explanation
    Accurately detecting and assessing incidents are the most challenging and essential parts of the incident response process.

    Rate this question:

  • 4. 

    Which of the following is a security incident indication?

    • A.

      A system alarm, or similar indication from an intrusion detection

    • B.

      DoS attack, or users not able to log into an account

    • C.

      System crashes, or poor system performance

    • D.

      Attempt to logon to a new user account

    • E.

      All of these points

    Correct Answer
    D. Attempt to logon to a new user account
    Explanation
    All of these are security incident indications.

    Rate this question:

  • 5. 

    Based on incident prioritization, which one of the following incidents should have first priority (Priority 1)?

    • A.

      GatorLink account compromised and being used to send spam.

    • B.

      Multifunction printer/fax/scanner servicing a department stops functioning.

    • C.

      MyUFL is down; hacking/compromise of critical UF system leading to service unavailability/disclosure of restricted data.

    • D.

      ELearning is down but during spring break; AP Pay cycle will not run during the beginning of a pay period.

    • E.

      Videoconferencing via Polycom is unavailable for a specific conference.

    Correct Answer
    C. MyUFL is down; hacking/compromise of critical UF system leading to service unavailability/disclosure of restricted data.
    Explanation
    The incident involving MyUFL being down due to hacking/compromise of a critical UF system is given first priority because it not only leads to service unavailability but also poses a risk of disclosure of restricted data. This incident has the potential to cause significant damage and compromise the security of the system and the data it contains. Therefore, it requires immediate attention and resolution to minimize the impact on the organization.

    Rate this question:

  • 6. 

    Which of the following is correct about incident response?

    • A.

      The goal of an incident response plan is to handle the situation in a way that limits damage and reduces recovery time and costs.

    • B.

      An incident response plan includes a policy that defines, in specific terms, what constitutes an incident and provides a step-by-step process that should be followed when an incident occurs.

    • C.

      Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident).

    • D.

      All of these points

    Correct Answer
    D. All of these points
    Explanation
    All of these are correct about incident response, including: Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident).

    Rate this question:

  • 7. 

    Incident handling includes which of the following three functions?

    • A.

      Incident reporting, response, virtualization

    • B.

      Incident reporting, analysis, response

    • C.

      Incident analysis, response, virtualization

    • D.

      Incident reporting, analysis, virtualization

    Correct Answer
    B. Incident reporting, analysis, response
    Explanation
    Incident handling includes incident reporting, analysis, and response.

    Rate this question:

  • 8. 

    Which one of the following functions is correctly defined below?

    • A.

      Incident reporting begins once information is known about the events of the incident.

    • B.

      Incident response includes receiving reports or indications that an event is occurring or has occurred.

    • C.

      Incident analysis is the examination of available information, evidence or artifacts related to an event.

    • D.

      None of these options are correct.

    Correct Answer
    C. Incident analysis is the examination of available information, evidence or artifacts related to an event.
    Explanation
    Incident analysis is the examination of available information, evidence or artifacts related to an event. 

    Rate this question:

  • 9. 

    Incidents should be reported to ___?

    • A.

      The CERT Coordination Center

    • B.

      User

    • C.

      Attacker

    • D.

      Clients

    Correct Answer
    A. The CERT Coordination Center
    Explanation
    Incidents should be reported to the CERT Coordination Center.

    Rate this question:

  • 10. 

    The incident reporting function enables a CSIRT to serve as a central point of contact for reporting local problems.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The incident reporting function allows a CSIRT (Computer Security Incident Response Team) to act as a central point of contact for reporting local problems. This means that individuals or organizations experiencing security incidents or problems can report them to the CSIRT, who will then coordinate and handle the response. By serving as a central point of contact, the CSIRT can efficiently gather information, assess the situation, and provide appropriate assistance or guidance to address the reported problems.

    Rate this question:

  • 11. 

    Having a central point of contact allows all incident reports and activity to be collected in one location where information can be reviewed and correlated across the parent organization or constituency.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Having a central point of contact allows for efficient and effective management of incident reports and activity. By collecting all information in one location, it becomes easier to review and analyze the data, identify patterns or trends, and make informed decisions. This centralized approach also enables better coordination and communication across different departments or entities within the parent organization or constituency. Overall, having a central point of contact enhances the organization's ability to respond promptly and appropriately to incidents and fosters a more streamlined and cohesive incident management process.

    Rate this question:

  • 12. 

    The collected information about the incident is irrelevant to be used to determine trends and patterns of intruder activity and recommend corresponding preventative strategies for the whole constituency.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is suggesting that the collected information about the incident is relevant for determining trends and patterns of intruder activity and recommending corresponding preventative strategies for the whole constituency. Therefore, the correct answer is False.

    Rate this question:

  • 13. 

    Which of the following is correct about a computer incident response team

    • A.

      A group that handles events involving computer security breaches. Although most organizations have measures in place to prevent security problems, such events may still occur unexpectedly and must be handled efficiently by this group’s experts, which include team members from specified departments and specialties.

    • B.

      A nonprofit professional organization made up of member incident response teams. It brings together a large number of incident response teams that span a wide spectrum of public resource, internal, vendor, and commercial teams.

    • C.

      A concrete organizational entity (i.e., one or more staff) that is assigned the responsibility of providing part of the incident management capability for a particular organization.

    • D.

      All of these points

    Correct Answer
    D. All of these points
    Explanation
    The correct answer is "All of these points" because all three statements accurately describe a computer incident response team. The first statement explains that the team handles events involving computer security breaches, which is a key responsibility of such a team. The second statement describes a nonprofit professional organization that brings together multiple incident response teams, which is another way to define a computer incident response team. The third statement defines a computer incident response team as a concrete organizational entity responsible for providing incident management capability. Therefore, all of these points are correct about a computer incident response team.

    Rate this question:

  • 14. 

    Which of the following is the coordination center of the computer emergency response team (CERT) for the software engineering institute (SEI), a non-profit united states federally funded research and development center. It researches software bugs that impact software and internet security, publishes research and information on its findings, and works with business and government to improve security of software and the internet as a whole. 

    • A.

      Computer Emergency Response Team (CERT)

    • B.

      Forum for Incident Response and Security Teams (FIRST)

    • C.

      CERT Coordination Center (CERT/CC)

    • D.

      Computer Incident Response Team (CIRT)

    Correct Answer
    C. CERT Coordination Center (CERT/CC)
    Explanation
    The correct answer is CERT Coordination Center (CERT/CC). The CERT Coordination Center is the coordination center of the computer emergency response team (CERT) for the software engineering institute (SEI). It is a non-profit United States federally funded research and development center that focuses on researching software bugs that impact software and internet security. It also publishes research and information on its findings and works with business and government to improve the security of software and the internet as a whole.

    Rate this question:

  • 15. 

    Information Analysis Infrastructure Protection (IAIP) is a nonprofit organization that provides a central resource for gathering information on cyber threats to critical infrastructure and providing two-way sharing of information between the private and public sectors.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. Information Analysis Infrastructure Protection (IAIP) is not a nonprofit organization that provides a central resource for gathering information on cyber threats to critical infrastructure and providing two-way sharing of information between the private and public sectors.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 24, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 22, 2018
    Quiz Created by
    Charlesss
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.