CJCSM 6510.01B, Encl. B Flashcards
What is the DoD system of record for lessons learned?
JLLIS
What is the primary vehicle for reporting and recording all cyber incidents and reportable events?
JIMS
Security classifications of cyber incidents are determined in accordance with which publication?
DoDI O-3600.02
How many different types of initial cyber incident reporting are there?
2
What is the minimum security requirement when sending e-mails reporting a cyber incident?
Digital Signature
What includes the coordinated and initial actions taken to protect the information network or IS from any further malicious activity and to acquire the data required fro further analysis?
Preliminary response
What will Cyber incident containment be coordinated with?
CNDSP
Which type of data is RAM considered?
Volatile
Which type of data are system images and malware considered to be?
Persistent
Which type of data is the configuration around the system considered to be?
Environmental
What is defined as a series of analytical steps taken to find out what happened in an incident?
Cyber incident analysis
What should any software artifacts suspected of being malware be submitted to?
Joint Malware Catalog (JMC)
What is the primary path or method used by the adversary to cause the cyber incident or even to occur?
Delivery vector
What expands upon the identified delivery vectors and system weaknesses by precisely identifying the
sets of conditions allowing the incident to occur?
Root cause identification
What refers to an incident’s detrimental impact on the technical capabilities of the organization?
Technical Impact (TI)