Incident investigation and response Flashcards

1
Q

Analysis:

A

The investigation and validation of alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Broken chain of custody:

A

Inconsistencies in the collection and logging of evidence in the chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business continuity plan (BCP):

A

A document that outlines the procedures to sustain business operations during and after a significant disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chain of custody:

A

The process of documenting evidence possession and control during an incident lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Containment:

A

The act of limiting and preventing additional damage caused by an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crowdsourcing:

A

The practice of gathering information using public input and collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detection:

A

The prompt discovery of security events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Documentation:

A

Any form of recorded content that is used for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Honeypot:

A

A system or resource created as a decoy vulnerable to attacks with the purpose of attracting potential intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Eradication:

A

The complete removal of the incident elements from all affected systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Indicators of compromise (IoC)

A

Observable evidence that suggests signs of a potential security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Final report:

A

Documentation that provides a comprehensive review of an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident response plan:

A

A document that outlines the procedures to take in each step of incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Indicators of attack (IoA):

A

The series of observed events that indicate a real-time incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intrusion detection system (IDS):

A

An application that monitors system activity and alerts on possible intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lessons learned meeting:

A

A meeting that includes all involved parties after a major incident

15
Q

Open-source intelligence (OSINT):

A

The collection and analysis of information from publicly available sources to generate usable intelligence

16
Q

Playbook:

A

A manual that provides details about any operational action

17
Q

Post-incident activity:

A

The process of reviewing an incident to identify areas for improvement during incident handling

18
Q

Recovery:

A

The process of returning affected systems back to normal operations

19
Q

Resilience:

A

The ability to prepare for, respond to, and recover from disruptions

19
Q

Standards:

A

References that inform how to set policies

19
Q

Threat intelligence:

A

Evidence-based threat information that provides context about existing or emerging threats

20
Q

Threat hunting:

A

The proactive search for threats on a network

20
Q

Triage:

A

The prioritizing of incidents according to their level of importance or urgency