Tabletop exercises Quiz

1. What is the focus of a tabletop exercise for a data breach scenario?

2. In a phishing attack scenario, what is one of the key focuses?

3. What should be prioritized in a denial of service (DoS) attack scenario?

4. Which scenario focuses on detection of unusual internal activities and access control?

5. What is a key focus in a cloud service compromise scenario?