Icon New game New game
Get Academic Plan
Get Academic Plan
Get Academic Plan

CS Chapters 7 and 8

Alphabet

Chapter 7: Creating a Security Plan
Chapter 8: Disaster Recovery

Download the paper version to play

Recommended age: 18 years old
35 times made

Created by

Malaysia

Top 10 results

  1. 1
    04:40
    time
    100
    score
Do you want to stay in the Top 10 of this game? to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

CS Chapters 7 and 8Online version

Chapter 7: Creating a Security Plan Chapter 8: Disaster Recovery

by Aidora Abdullah
A
B
C
D
E
F
G
H
I
L
M
P
R
T
V

Starts with A

_____________ programmers are part of the security planning team.

Starts with B

Incident response is an organized approach to address and manage the aftermath of a security __________.

Starts with C

Access __________ is part of the Protection Phase of the NIST framework.

Starts with D

The third stage/phase of the NIST Cyber Security Framework.

Starts with E

An example of a point that must be protected when implementing a security plan.

Starts with F

In February 2021 this year, _____________ was the highest type of cyber attack incident reported to Cybersecurity Malaysia.

Starts with G

The _________ of incident response is to handle the situation in a way that limits damage and reduces recovery time and costs.

Starts with H

Something in the organization that you must make an inventory of when implementing a security plan.

Starts with I

A security attack or breach that has happened in an organization.

Starts with L

A key element of a good security policy is that it is enforceable by ________.

Starts with M

Budget, hiring and retention, insecure networks and insider threats are reasons why an organization must ________________ security.

Starts with P

The goal of computer security planning is to create good security ___________ in an organization.

Starts with R

With regard to the contents of a security plan, accountability refers to the person _____________.

Starts with T

When preparing for emergencies, we must always _________ the plan (again and again!)

Starts with V

When establishing policies and procedures, we must identify how security breaches and _______________ are reported.

educaplay suscripción