Incident Response Flashcards

1
Q

What is the first step in the incident response process?

A

Preparation—having a plan in place to handle potential cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an incident response plan (IRP)?

A

A documented plan outlining how to detect, respond to, and recover from cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the second step of the incident response process?

A

Identification—determining whether an event is indeed a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is containment in incident response?

A

Limiting the damage of a cybersecurity incident and preventing further damage to the system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is eradication in incident response?

A

The process of removing the cause of the incident, such as deleting malware or closing vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is recovery in incident response?

A

Restoring and validating system functionality after the threat has been neutralized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a post-incident analysis?

A

A review of the incident and the response to it, aimed at improving the response plan for future incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a security information and event management (SIEM) system?

A

A solution that provides real-time analysis of security alerts generated by applications and network hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an incident response team (IRT)?

A

A group of experts responsible for preparing for and responding to cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a phishing attack in the context of incident response?

A

A social engineering attack where an attacker sends fraudulent communications that appear to come from a reputable source to steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of digital forensics in incident response?

A

The process of investigating, analyzing, and preserving evidence from a cybersecurity incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a false positive in incident response?

A

An alert that indicates suspicious activity when none actually exists, often resulting from over-sensitive detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly