5C Flashcards

1
Q

As previously explained in Objective 5b, incident analysis is the series of analytical steps taken to find out what happened in an incident. This includes the identification of the root cause of the incident.
Incident analysis is performed while an event is ___ ___ ___.

A

still in progress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In accordance with ____, the cyber incident process is a five-step process.

A

AFI 17-203

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the five steps to a root cause analysis?

A
  1. Gather Information
  2. Validate the Incident
  3. Determine the Operational Impact
  4. Coordinate
  5. Determine Reporting Requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The following describes which step of the cyber incident process?

All involved personnel should identify and collect all relevant information about the incident for use in incident analysis. Information gathered may include data previously acquired and preserved, external logs, personal accounts, all-source intelligence, technical information, or the current operational situation.

A

Gather Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The following describes which step of the cyber incident process?

Personnel should continuously review, corroborate, and update (if applicable) the reported incident to ensure the accuracy of all information.

A

Validate the incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The following describes which step of the cyber incident process?

Operational impact refers to detrimental impacts on an organization’s ability to perform its mission. This may include direct and/or indirect effects that diminish or incapacitate system or network capabilities, the compromise and/or loss of mission critical data, or the temporary or permanent loss of mission critical
applications or systems.

A

Determine the Operational Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The following describes which step of the cyber incident process?

Coordinate with the victim system’s owning CFP, network operations and security center (NOSC) and mission control center MCCC (as appropriate) to determine the Mission Assurance Category level of the system.

A

Coordinate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The following describes which step of the cyber incident process?

Determine within one hour if the event or incident meets AF Operational Reporting (OPREP-3) and/or USSTRATCOM or USCYBERCOM Commander’s Critical Information Requirements (CCIR) reporting requirements.

A

Determine Reporting Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does COA stand for?

A

Course of Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Detailed analysis to include affected system, probable
attacker, attack vector used, and technical and operational
impacts (if known).

A

Cyber Incident Report (CIR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Focuses on an incident, group of incidents, or network
activity or on a foreign individual, group, or organization
identified as a threat or potential threat to DOD networks.

A

Network Intelligence Report (NIR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data captured in the _____ includes lessons learned, initial root cause, problems with executing courses of action (COAs), missing policies and procedures, and inadequate infrastructure defenses.

A

postmortem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The results of postmortem will be provided to the affected MAJCOM/unit so that corrective actions can be taken, which could include _____ existing COAs, figuring out why the COAs failed, or creating new COAs.

A

revising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly