Ch. 2 - Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) Flashcards

1
Q

Actions, processes and tools for ensuring an organization can continue critical operations during a
contingency.

A. Business Continuity (BC)
B. Disaster Recovery (DR)
C. Business Impact (BI)
D. Disaster Response (DR)

A

A. Business Continuity (BC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In information systems terms, the activities necessary to restore IT and communications services to an organization during and after an outage, disruption or disturbance of any kind or scale.

A. Business Continuity (BC)
B. Disaster Recovery (DR)
C. Business Impact (BI)
D. Disaster Response (DR)

A

B. Disaster Recovery (DR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Definitions:

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition or any similar occurrence where: a person other than an authorized user accesses or potentially accesses personally identifiable information; or an authorized user accesses personally identifiable information for other than an authorized purpose.

A. Exploit
B. Event
C. Incident
D. Breach

A

D. Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definitions:

The documentation of a predetermined set of instructions or procedures that describe how an organization’s mission/business processes will be sustained during and after a significant disruption.

A. Business Continuity Plan (BCP)
B. Business Impact Analysis (BIA)
C. Disaster Recovery Plan (DRP)
D. Incident Response Plan (IRP)

A

A. Business Continuity Plan (BCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definitions:

An analysis of an information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption.

A. Business Continuity Plan (BCP)
B. Business Impact Analysis (BIA)
C. Disaster Recovery Plan (DRP)
D. Incident Response Plan (IRP)

A

B. Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Definitions:

The processes, policies and procedures related to preparing for recovery or continuation of an organization’s critical business functions, technology infrastructure, systems and applications after the organization experiences a disaster. A disaster is when an organization’s critical business function(s) cannot be performed at an acceptable level within a predetermined period following a disruption.

A. Business Continuity Plan (BCP)
B. Business Impact Analysis (BIA)
C. Disaster Recovery Plan (DRP)
D. Incident Response Plan (IRP)

A

C. Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definitions:

Any observable occurrence in a network or system.

A. Exploit
B. Event
C. Incident
D. Breach

A

B. Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Definitions:

A particular attack. It is named this way because these attacks exploit system vulnerabilities.

A. Exploit
B. Event
C. Incident
D. Breach

A

A. Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definitions:

An event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits.

A. Exploit
B. Event
C. Incident
D. Breach

A

C. Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Definitions:

The documentation of a predetermined set of instructions or procedures to detect, respond to and limit consequences of a malicious cyberattack against an organization’s information systems(s).

A. Business Continuity Plan (BCP)
B. Business Impact Analysis (BIA)
C. Disaster Recovery Plan (DRP)
D. Incident Response Plan (IRP)

A

D. Incident Response Plan (IRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definitions:

A security event, or combination of security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization.

A. Exploit
B. Intrusion
C. Vulnerability
D. Zero Day

A

B. Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Definitions:

A centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they
result in business disruptions.

A. Risk Operations Center (ROC)
B. Business Operations Center (BOC)
C. Emergency Operations Center (EOC)
D. Security Operations Center (SOC)

A

D. Security Operations Center (SOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definitions:

Weakness in an information system, system security procedures, internal controls or implementation that could be exploited or triggered by a threat source.

A. Exploit
B. Intrusion
C. Vulnerability
D. Zero Day

A

C. Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definitions:

A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognized patterns, or signature.

A. Exploit
B. Zero Trust
C. Vulnerability
D. Zero Day

A

D. Zero Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly