Network Flashcards

1
Q

What is the first step in assessing security threats?

A

Identifying potential threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: All security incidents should be treated with the same level of severity.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: The process of determining the impact of an incident is known as ______.

A

impact assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a common framework used for incident response?

A

The NIST Cybersecurity Framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which term describes the likelihood of a threat exploiting a vulnerability?

A

Risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the acronym CVSS stand for?

A

Common Vulnerability Scoring System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multiple Choice: Which of the following is NOT a phase in the incident response lifecycle? A) Preparation B) Detection C) Reaction D) Recovery

A

C) Reaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a risk assessment?

A

To evaluate potential risks and determine how to mitigate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Mitigation strategies should only be implemented after a security incident occurs.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a security incident?

A

An event that compromises the confidentiality, integrity, or availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: ______ analysis helps organizations understand the consequences of incidents.

A

Threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ‘vulnerability’ refer to in cybersecurity?

A

A weakness in a system that can be exploited by threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multiple Choice: Which factor is NOT typically considered when assessing the severity of an incident? A) Data sensitivity B) Financial impact C) Time of day D) Compliance requirements

A

C) Time of day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What role does communication play in incident response?

A

Effective communication ensures all stakeholders are informed and coordinated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: Documentation is unimportant during the incident response process.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between a threat and a vulnerability?

A

A threat is a potential danger, while a vulnerability is a weakness that can be exploited.

17
Q

Fill in the blank: A ______ is a documented plan for responding to different types of incidents.

A

incident response plan.

18
Q

What is the main goal of incident mitigation?

A

To reduce the impact of security incidents on the organization.

19
Q

Multiple Choice: Which of the following is considered a proactive security measure? A) Incident reporting B) Security training C) Post-incident review D) None of the above

A

B) Security training.

20
Q

What is the function of an incident severity matrix?

A

To categorize incidents based on their impact and urgency.

21
Q

True or False: All security incidents require immediate escalation.

A

False.

22
Q

What should be included in an incident report?

A

Details of the incident, response actions taken, and lessons learned.

23
Q

Fill in the blank: After an incident, organizations should conduct a ______ to identify improvements.

A

post-mortem analysis.

24
Q

What is a common tool used for tracking incidents?

A

Incident management software.

25
Q

Multiple Choice: Which of the following is a common indicator of a security incident? A) Unusual network traffic B) Routine system updates C) Scheduled maintenance D) None of the above

A

A) Unusual network traffic.

26
Q

What is the importance of training employees in security awareness?

A

To reduce the likelihood of human error leading to security incidents.