Domain 2 Flashcards

Incident Response, Business Continuity, & Disaster Recovery Concepts

1
Q

Adverse Events

A

events with negative consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Breach

A

when an entity who is unauthorized accesses PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business Continuity

A

actions, processes, & tools for ensuring organization can continue critical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business Continuity Plan

A

documentation of predetermined instructions/procedures to ensure Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business Impact Analysis

A

analysis of IS requirements, function, & interdependencies to determine continuity requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disaster Recovery

A

in IS terms, necessary actions to restore IT/communications to a company (follows after Incident Response/Handling)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disaster Recovery Plan

A

processes, policy, and procedures for recovery/continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Event

A

observable occurrence in a network/system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exploit

A

particular attack that attacks specific vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident

A

event that (actually/potentially) jeopardizes CIA of a IS or data within IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident Handling/Response

A

process of detecting/analyzing incidents to limit its effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Incident Response Plan

A

documentation of predetermined set of instructions/procedures to respond to/limit effects of malicious cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Instrusion

A

unauthorized access to system/system resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOC

A

Security Operations Center. Information security team that monitors, detects, and analyzing events to prevent/resolve issues before disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability

A

weakness in IS, security procedures, internal controls, or implementation that can be exploited/triggered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zero Day

A

previously unknown system vulnerability with potential of exploitation without detection/prevention because it does not fit recognized patterns, signatures, or methods (tech equivalent of “Patient 0”)