CJCSM 6510.01B Cyber Incident Handling Program Flashcards
Federal agencies are required to have in place cyber incident handling mechanisms in accordance with which act?
FISMA
How many services does the Department of Defense require Tier II Computer Network Defense Service Providers (CDSPs) to provide?
3
Which program was developed by the Department of Defense to provide specific guidance for CC/S/A/FAs regarding the requirements for cyber incident handling and reporting?
Cyber Incident Handling Program
Joint Staff and CC/S/A/FAs will comply with DoD Cyber Incident Handling Program responsibilities in accordance with which reference?
CJCSI 6510.01
Which agency must Joint Staff and CC/S/A/FAs ensure that Tier II CNDSPs are registered with to provide CND services for CC/S/A/FA information networks and ISs?
DISA
Which command must Joint Staff and CC/S/A/FAs coordinate with on cyber incidents prior to taking action outside the Department of Defense?
USCYBERCOM
Which command directs the operation and defense of DoD information networks IAW the UCP?
USSTRATCOM
What must USSTRATCOM coordinate with on matters relating to the governance, secure operations, and defense of the IC networks?
IC-IRC
What directs the actions taken, within the Department of Defense, to protect, monitor, analyze, detect, and respond to unauthorized activity within DoD information networks and ISs?
CND
How many different tiers is the Department of Defense organized into to conduct CND?
3
Which tier provides DoD-wide CND operational direction or support to CC/S/A/FAs?
Tier 1
Which tier provides DoD component-wide CND operational direction or support?
Tier 2
Which tier provides local CND operational direction or support?
Tier 3
Which type of data gives the Department of Defense the ability to sense changes in DoD information networks?
AS&W
Which type of data gives the Department of Defense the ability to sense changes in adversary activities?
I&W
Which community investigates criminal activity and disseminates threat data that may pertain to domestic or foreign individuals and groups who constitute threats to the Department of Defense?
LE
Which CND response service identifies several critical elements of an incident to determine and characterize its possible effects on DoD information networks, operational missions, and other defense programs?
Cyber Incident Analysis
What ensures the acquisition and preservation of data required for tactical analysis, strategic analysis, and/or LE investigations?
Cyber Incident Response
What is the DoD system of record for lessons learned?
JLLIS
What is the primary vehicle for reporting and recording all cyber incidents and reportable events?
JIMS
Security classifications of cyber incidents are determined in accordance with which publication?
DoDI O-3600.02
How many different types of initial cyber incident reporting are there?
2
What is the minimum security requirement when sending emails reporting a cyber incident?
digital signature
What includes the coordinated and initial actions taken to protect the information network or IS from any further malicious activity and to acquire the data required for further analysis?
Preliminary response
What will Cyber incident containment be coordinated with?
CNDSP
What type of data is RAM considered?
Volatile
Which type of data are system images and malware considered to be?
Persistent
Which type of data is the configuration around the system considered to be?
Environmental
What is defined as a series of analytical steps taken to find out what happened in an incident?
Cyber incident analysis
What should any software artifacts suspected of being malware be submitted to?
Joint Malware Catalog (JMC)
What is the primary path or method used by the adversary to cause the cyber incident or even to occur?
Delivery vector
What expands upon the identified delivery vectors and system weaknesses by precisely identifying the sets of conditions allowing the incident to occur?
Root cause identification
What refers to a detrimental impact on an organization’s ability to perform its mission?
Operational Impact (OI)
What refers to an incident’s detrimental impact on the technical capabilities of the organization?
Technical Impact (TI)
What must actions that potentially affect traffic on the DoD Protected Traffic List be coordinated with?
USCYBERCOM
What involves understanding and accurately characterizing the relationship of incidents reported and providing awareness of the cyber security trends as observed by the affected parties?
Trending analysis
ISs having which categories of cyber incidents must be rebuilt from trusted media and have up-to-date AV software loaded and configured IAW STIGs and WARNORDs prior to connecting the IS to the information network?
1, 2, and 7
What is used to document the technical and operational impact of the cyber incident on the organization?
BDA
Within how many hours after the cyber incident has been resolved must the JIMS incident record be updated with the BDA?
24
What are lessons learned, initial root cause, problems with executing COAs, and missing policies and procedures all part of?
Post-incident analysis
Where are cyber incidents sent that require a postmortem?
USCYBERCOM
What is defined as a set of scripts, programs, and other resources used to safely acquire, examine, and preserve volatile and non-volatile data from an IS?
First responder toolkit
How many different types of incident response primary reporting structures are there?
2
Which type of reporting structure describes the interactions between each of the tier levels and how reporting, notification, and communications shall occur?
Technical