Domain 2 Flashcards

Incident Response, Business Continuity, and Disaster Recovery

1
Q

responds to unexpected changes in operating conditions to keep the business operating

A

The Incident Response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Business Continuity plan

A

enables the business to continue operating throughout the crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

activated to help the business return to normal operations as quickly as possible if both the Incident Response and Business Continuity plans fail

A

Disaster Recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term is sometimes used interchangeably with “incident management”?

A

Crisis Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a red book in the context of business continuity?

A

To serve as a hard copy backup accessible outside the facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the proactive development of procedures to restore business operations after a disaster or other significant disruption to the organization

A

Business Continuity planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are notification systems and call trees important in a business continuity plan?

A

To alert personnel when the BCP is being enacted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a key outcome of a Business Impact Analysis (BIA)?

A

Identification of functions and dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the first phase in the components of an incident response plan?

A

Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the next step after detection and analysis in the incident response process?

A

Finding the appropriate containment strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disaster recovery refers specifically to

A

restoring the information technology and
communications services and systems
needed by an organization, both during the
period of disruption caused by any event
and during restoration of normal services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary distinction between business continuity planning (BCP) and disaster recovery planning (DRP)?

A

DRP is about restoring IT, while BCP focuses on business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is very likely to be used in a disaster recovery (DR) effort?

A

Data backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of the Executive Summary in a Disaster Recovery Plan?

A

To offer a high-level overview of the plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Breach

A

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition or any similar occurrence where: a person other than an authorized user accesses or potentially accesses personally identifiable information; or an authorized user accesses personally identifiable information for other than an authorized purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Business Continuity (BC)

A

Actions, processes and tools for ensuring an organization can continue critical operations during a contingency.

17
Q

Business Continuity Plan (BCP)

A

The documentation of a predetermined set of instructions or procedures that describe how an organization’s mission/business processes will be sustained during and after a significant disruption.

18
Q

Business Impact Analysis (BIA)

A

Business Impact Analysis (BIA)
An analysis of an information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption

19
Q

Disaster Recovery (DR)

A

In information systems terms, the activities necessary to restore IT and communications services to an organization during and after an outage, disruption or disturbance of any kind or scale.

20
Q

Disaster Recovery Plan (DRP)

A

The processes, policies and procedures related to preparing for recovery or continuation of an organization’s critical business functions, technology infrastructure, systems and applications after the organization experiences a disaster. A disaster is when an organization’s critical business function(s) cannot be performed at an acceptable level within a predetermined period following a disruption.

21
Q

Incident Handling or Incident Response (IR)

A

The process of detecting and analyzing incidents to limit the incident’s effect.

22
Q

Incident Response Plan (IRP)

A

The documentation of a predetermined set of instructions or procedures to detect, respond to and limit consequences of a malicious cyberattack against an organization’s information systems(s).

23
Q

Security Operations Center

A

A centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions

24
Q

Vulnerability

A

Weakness in an information system, system security procedures, internal controls or implementation that could be exploited or triggered by a threat source

25
Q

Zero Day

A

A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognized patterns, signatures or methods

26
Q

Who must provide support for business continuity planning efforts?

A

Executive management or an executive sponsor

27
Q

In the United States, what type of networks can be used to maintain essential activity during a severe cyberattack that affects communications?

A

Military-grade networks

28
Q

Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?

A

Backups

29
Q

Why is it necessary to consider not only the server level but also the database and dependencies on other systems in disaster recovery plans for complex systems?

A

To address the intricate dependencies of the systems

30
Q

What are the four primary responsibilities of a response team when an incident occurs?

A

Determining damage, assessing compromise, implementing recovery procedures, and supervising security measures

31
Q

What is the key responsibility of the incident response team in the plan?

A

Assessing and scoping out damage

32
Q

An external entity has tried to gain access to your organization’s IT environment without proper authorization.

This is an example of a(n) _________.

A

Intrusion

33
Q

What is the key characteristic of a Zero Day vulnerability?

A

It does not fit recognized patterns, signatures, or methods

34
Q

You are working in your organization’s security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success.

After a brief investigation, you determine that the user’s account has been compromised.

This is an example of a(n)_________.

A

Incident detection