Cryptocurrency and Blockchain
Risk Management
Business Continuity and Disaster Recovery
Incident Response and Security Measures
Mobile Device Security
100

This technology is the foundation of cryptocurrencies

What is blockchain?

100

This involves managing digital identities and their access privileges

What is identity management?

100

This process assesses the potential impacts of disruptive events

What is business impact analysis?

100

This system detects and prevents intrusions

What is an IPS (Intrusion Prevention System)?

100

This outlines the introduction of mobile devices into organizations

What are mobile device deployment methods?

200

This cryptocurrency is widely recognized

What is Bitcoin?

200

These are the various categories of uncertainties leading to harm

What are risk types?

200

These plans ensure business operations continue after disruptions

What are business continuity plans?

200

This integrates threat intelligence and automates response actions

What is SOAR (Security Orchestration, Automation, and Response)?

200

This solution manages mobile device applications and data securely

What is mobile device management (MDM)?

300

This platform enables the execution of smart contracts

What is Ethereum?

300

This method employs specific data for risk assessment

What are quantitative risk calculations?

300

These plans focus on restoring business functions post-incident

What are disaster recovery plans?

300

This technology provides solutions against mobile device threats

What is mobile threat defence (MTD)?

300

This offers a comprehensive approach to mobile device management

What is enterprise mobility management?

400

These are automated contracts on the blockchain

What are smart contracts?

400

This is where identified risks and their mitigation strategies are recorded

What is a risk register?

400

This defines the acceptable time to restore a function after a disaster

What is recovery time objective?

400

This involves managing and mitigating security incidents or breaches

What is incident response?

400

This is how Apple's mobile OS caters to business needs

What is iOS in the enterprise?

500

This consensus mechanism is based on the amount of cryptocurrency held

What is Proof of Stake (PoS)?

500

This is the maximum acceptable downtime for a process

What is maximum tolerable downtime?

500

At this point in time, data must be recovered following an incident

What is recovery point objective?

500

This is how the security of mobile devices and data is managed

What is mobile device management (MDM)?

500

This describes bypassing device restrictions on mobile phones

What is rooting and jailbreaking?

M
e
n
u