IS4670 Chapter 13 Incident and Intrusion Response Flashcards

1
Q
  1. The ideal time for an organization to learn how to respond to security incidents is after suffering an attack.
    A. True
    B. False
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. It is impossible to prevent all security incidents. Therefore, when a security incident does occur, an organization must ________ its impact.
A

Minimize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
3. Which of the following is a violation of computer security policies, acceptable use policies, or standard security practices?
A. Event 
B. Adverse event 
C. Computer security incident 
D. US-CERT
A

Computer security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. The ideal incident response team membership and structure depends on the type of organization and its risk management strategy.
    A. True
    B. False
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
5. An incident response team should place all emergency system information in a central, offline location. Which of the following is not a type of information that falls into this category?
A. Malicious code 
B. Administrative passwords 
C. Network layout diagrams 
D. Router configuration information 
E. Firewall configuration information
A

Malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
6. Which member of an incident response team is responsible for a particular incident or set of related security incidents?
A. Team leader 
B. Incident lead 
C. Associate member 
D. Chief information officer
A

Incident lead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. The incident response team performs most actions in response to an incident. However, all levels of IT staff should be aware of how to report incidents internally.
    A. True
    B. False
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. An organization’s ________ outlines specific procedures to follow in the event of a security incident.
A

Incident response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. An organization should try to let attackers know that the organization is aware of their activities.
    A. True
    B. False
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. ________ assists federal civilian agencies in their incident-handling efforts. It analyzes the information provided by all agencies to identify trends and precursors of attacks.
A

US-CERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. When an organization is determining the damage it has sustained, it should consider both ________ and ________ costs.
A

Direct, Indirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly