Explore the essentials of safeguarding information assets with this quiz. Assess your understanding of availability, confidentiality, integrity, mitigation strategies, and recovery plans. Ideal for learners aiming to enhance their knowledge in information security practices.
Contingency planning policy
Incident response policy
Disaster recovery policy
Cross-training policy
Rate this question:
After action review
Advisory distribution
Incident response
CSIRT resource meeting
Rate this question:
Heartbeat attack
Distributed denial-of-service
Networked denial-of-service
Targeted denial-of-service
Rate this question:
System recovery
Storage recovery
Applications recovery
Network recovery
Rate this question:
Strategic planning
Contingency planning
Enterprise information planning
Security planning
Rate this question:
End-user training
Offensive
Defensive
Hacking
Rate this question:
DNS cache poisoning
Denial-of-service (DoS)
Port mirroring
Evasion
Rate this question:
HIDPS
Knowledge-based IDPS
NIDPS
AppIDPS
Rate this question:
Data management
Vendor contact
Applications recovery
Storage recovery
Rate this question:
Follow-on incidents
Blue bag operations
Black bag operations
War games
Rate this question:
Business impact analysis (BIA)
Business continuity analysis (BCA)
Incident response analysis (IRA)
Threat analysis
Rate this question:
Contingency plan
Security plan
Threat plan
Social plan
Rate this question:
Avoidance
BC
DR
Risk assessment
Rate this question:
Transference
Avoidance
Acceptance
Mitigation
Rate this question:
IR duty officer
Project manager
Software engineer
Forensic expert
Rate this question:
Post-incident activity
Incident report
Resolution
Triage
Rate this question:
Catalyst
Semtex
CSIRT
IR plan
Rate this question:
Port monitoring
Signature matching
Packet sniffing
Traffic measurement
Rate this question:
IT staff leader
Educational liaison
Champion
Technical lead
Rate this question:
Modifying Web-based content without permission
Asking for large numbers of resources
Knowingly sending a virus-infected message
Downloading unauthorized software
Rate this question:
Loss analysis
Configuration
Forensics
Rehearsal
Rate this question:
IRP
CSIRT Performance Measures
AAR
NIST
Rate this question:
Department of Defense
U.S. Treasury Department
FBI
U.S. Secret Service
Rate this question:
WAN
LAN
Cache
Filter
Rate this question:
Threat
Intellectual property
Payload
Trojan horse
Rate this question:
Forensic analysis
Threat of attack analysis
Cross-training analysis
Business impact analysis
Rate this question:
Speed
Accuracy
Cost-effectiveness
Robustness
Rate this question:
Mobile site
Service bureau
Hot site
Mirrored site
Rate this question:
Critical violations
Incident candidates
Service alarms
Hacker intrusions
Rate this question:
Inactive system
Precursor
Signal
Indication
Rate this question:
Associate
Affiliate
Specialist
Fellow
Rate this question:
Partially outsourced
Employees
24/7
Fully outsourced
Rate this question:
Proactive security awareness
Security quality management
Protect and forget
Apprehend and prosecute
Rate this question:
Mission
Scope of operations
Policy
Constituency
Rate this question:
Authorized
Real
Intrusive
Aggressive
Rate this question:
Block
Lockdown
Isolation
Disablement
Rate this question:
Under Attack
The Cuckoo's Egg
The Hacker
Stalking the Wily Hacker
Rate this question:
Discovery
Analysis
Field
Examination
Rate this question:
Blue bag operations
Black bag operations
Follow-on incidents
War games
Rate this question:
Desk check
Alert message
Trigger message
Stand-down
Rate this question:
Damage assessment report
DR plan desk system
DR plan simulation
Auxiliary phone alert and reporting system
Rate this question:
project manager
Crisis manager
Incident manager
Champion
Rate this question:
Confidentiality
Risk assessment
Availability
Integrity
Rate this question:
Mitigation
Acceptance
Transference
Avoidance
Rate this question:
Integrity
Availability
Confidentiality
Risk assessment
Rate this question:
C.I.A. triangle
Asset classification
Strategic plan
Disaster recovery plan
Rate this question:
Programmers
Social engineers
Script kiddies
Cyberterrorists
Rate this question:
Organizational management and professionals
Information security management and professionals
Information technology management and professionals
Human resource management and professional
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.