Cybersecurity: Minimizing Your Risk
/by Bryan Ginn
Quiz Summary
0 of 25 questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 25 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 25
1. Question
Cybersecurity incidents typically only involve less than 50,000 people. True or false?
CorrectIncorrect -
Question 2 of 25
2. Question
What are the potential costs and effects of a cybersecurity incident? (Select all that apply)
CorrectIncorrect -
Question 3 of 25
3. Question
Which of the following are entities that you may contact during incident response (select all that apply)?
CorrectIncorrect -
Question 4 of 25
4. Question
How quickly do potential notification obligations begin to regulators and/or individuals?
CorrectIncorrect -
Question 5 of 25
5. Question
What information does your legal team need to know to assess obligations to notify potentially impacted individuals and/or regulators (select all that apply)?
CorrectIncorrect -
Question 6 of 25
6. Question
All breaches are cybersecurity incidents, but not all cybersecurity incidents are breaches – true or false?
CorrectIncorrect -
Question 7 of 25
7. Question
What is the average time to identify a data breach?
CorrectIncorrect -
Question 8 of 25
8. Question
What regulatory benefit is achieved by aligning information security to cybersecurity frameworks?
CorrectIncorrect -
Question 9 of 25
9. Question
Why should incident communications be managed?
CorrectIncorrect -
Question 10 of 25
10. Question
A cross-functional response team should consist of (select all that apply)
CorrectIncorrect -
Question 11 of 25
11. Question
Which item is not part of an incident response ‘break glass’ plan?
CorrectIncorrect -
Question 12 of 25
12. Question
What is a cybersecurity incident?
CorrectIncorrect -
Question 13 of 25
13. Question
Nation-state actors often will target smaller organizations, which best explains why?
CorrectIncorrect -
Question 14 of 25
14. Question
Which is the most effective mechanism to mitigate credential compromise?
CorrectIncorrect -
Question 15 of 25
15. Question
A malicious incident is the only thing that can give rise to a cybersecurity breach, true or false?
CorrectIncorrect -
Question 16 of 25
16. Question
If a user doesn’t visit suspicious sites, has a strong anti-virus, and doesn’t open suspicious email attachments – then they aren’t going to have their machine compromised, true or false?
CorrectIncorrect -
Question 17 of 25
17. Question
Which of the following is an offensive attack framework?
CorrectIncorrect -
Question 18 of 25
18. Question
What is the most common attack/threat vector for malicious actors?
CorrectIncorrect -
Question 19 of 25
19. Question
Which is not a motive for external threat actors?
CorrectIncorrect -
Question 20 of 25
20. Question
Which is an actual step in the NIST incident response framework?
CorrectIncorrect -
Question 21 of 25
21. Question
Cybersecurity frameworks integrate industry standards and best practices, what best describes why?
CorrectIncorrect -
Question 22 of 25
22. Question
Which is not a Cybersecurity framework type?
CorrectIncorrect -
Question 23 of 25
23. Question
Which is not a type of risk mitigation strategy?
CorrectIncorrect -
Question 24 of 25
24. Question
Which question does not address 3rd Party Risk Management?
CorrectIncorrect -
Question 25 of 25
25. Question
What is the purpose of commander’s intent during the course of an incident?
CorrectIncorrect