Chapter 9 Flashcards

1
Q

What is it called when an occurrence happens, security wise?

A

Security event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A server crash that has a negative effect on the company is called a what?

A

Adverse event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a skl is lost, what is this an example of? A loss of sensitive information

A

A security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As a warrant officer, I am responsible for submitting a report that follows the sop. I am apart of what kind of team?

A

Computer security incident response teams (csirt)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the name of the process a csirt member must go through?

A

PDCP (preparation, detection, containment, post-incident)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name a few things that must be apart of the incident response kit

A

USB bootable media, backup devices, workstations, laptop for other forensic activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which standard for security events?

A

NIST 800 - 61

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

According to NIST ) now can you improve incident analysis?

A

Declutter to capture traffic
Have a continuity book
Capture bad traffic -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is root cause analysis

A

A process to correct all that caused the problem in the first place of the problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

For now long does the federal government retain records?

A

3 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Csirt members should follow this in the event a security incident just occurred

A

Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This book describes the procedures you must follow when facing a security incident helps guide the CSIRT’s response

A

Playbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of threat uses brute-force to expose or compromise data?

A

Attrition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of attackers goes after the big dawgs such as nation state actors and uses zero day vulnerabilities to their advantage?

A

Apt advanced persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two things to look at when a security incident happens?

A

The scope of the incident and the severity of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of economic impact category does 10,000 fall under?

A

Low economic impact

17
Q

Which type of economic impact does $10,000 - 500,000 fall under?

A

Medium economic impact

18
Q

Name the economic impact category that is $500,000 or more fall under

A

High economic impact

19
Q

What is the sole purpose of cyber security frameworks

A

To help you walk through on what to expect from attacke-ee

20
Q

List 5 keywords that describe the mitre attack framework

A

Tactics
techniques.
Freely database
Matrices
Threat life cycle

21
Q

. Which framework speaks on the relationship in the event of an attack
The order of attacks are listed in this framework

A

The Diamond model of intrusion analysis

22
Q

What are the 7 stages of the cyber kill chain?

A

Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions on objectives

23
Q

Which 2 resources do analysts read on now to test systems for future attacks?

A

OSMM
OWASP