COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Who’s the contact person in your Team/Cluster that you need to share the Chat ID if you received chat regarding Cybersecurity Incident?
A
Teammate
B
CRE
C
OM
D
Office crush
Explanation: 

Detailed explanation-1: -Service providers, intermediaries, data centers and body corporate shall report the cyber security incidents to CERT-In within a reasonable time of occurrence or noticing the incident to have scope for timely action.

Detailed explanation-2: -Computer system breach. Unauthorized access to, or use of, systems, software, or data. Unauthorized changes to systems, software, or data. Loss or theft of equipment storing institutional data.

Detailed explanation-3: -Incident response is an organizational process that enables timely, effective response to cyberattacks. The incident response process includes identifying an attack, understanding its severity and prioritizing it, investigating and mitigating the attack, restoring operations, and taking action to ensure it won’t recur.

Detailed explanation-4: -The security incident response process is centered on the preparation, detection and analysis, containment, investigation, eradication, recovery, and post incident activity surrounding such an incident.

There is 1 question to complete.