Test your knowledge: To escalate or not to escalate Quiz Answer
In this article i am gone to share Coursera Course: Put It to Work: Prepare for Cybersecurity Jobs Week 2 Practice Quiz | Test your knowledge: To escalate or not to escalate Quiz Answer with you..
Also visit: Test your knowledge: Your impact on data protection Quiz Answer
Test your knowledge: To escalate or not to escalate Quiz Answer
Question 1)
Fill in the blank: A malware infection is an incident type that occurs when _____.
- a website experiences high traffic volumes
- an employee of an organization violates the organization’s acceptable use policies
- malicious software designed to disrupt a system infiltrates an organization’s computers or network
- a computer’s speed and performance improves
Question 2)
Fill in the blank: Improper usage is an incident type that occurs when _____.
- an employee that runs an organization’s public relations posts incorrect data on the company’s social media page
- malicious software designed to disrupt a system infiltrates an organization’s computers or network.
- an individual gains digital or physical access to a system or application without permission
- an employee of an organization violates the organization’s acceptable use policies
Question 3)
When should you escalate improper usage to a supervisor?
- Improper usage incidents should always be escalated out of caution.
- Improper usage incidents should be escalated if there is a high level of improper usage.
- Improper usage does not need to be escalated because these are in-house scenarios that can be handled without reporting them to the security team.
- Improper usage attempts that affect high-priority assets should be escalated; other improper usage instances are not as important.
Question 4)
Fill in the blank: Unauthorized access is an incident type that occurs when _____.
- an employee of an organization violates the organization’s acceptable use policies
- malicious software designed to disrupt a system infiltrates an organization’s computers or network
- an individual gains digital or physical access to a system, data, or an application without permission
- an authorized employee sends a job description to a friend before the job description has been released to the public