Network Flashcards

1
Q

What is the first step in assessing security threats?

A

Identifying potential threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: All security incidents should be treated with the same level of severity.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: The process of determining the impact of an incident is known as ______.

A

impact assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a common framework used for incident response?

A

The NIST Cybersecurity Framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which term describes the likelihood of a threat exploiting a vulnerability?

A

Risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the acronym CVSS stand for?

A

Common Vulnerability Scoring System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multiple Choice: Which of the following is NOT a phase in the incident response lifecycle? A) Preparation B) Detection C) Reaction D) Recovery

A

C) Reaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a risk assessment?

A

To evaluate potential risks and determine how to mitigate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Mitigation strategies should only be implemented after a security incident occurs.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a security incident?

A

An event that compromises the confidentiality, integrity, or availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: ______ analysis helps organizations understand the consequences of incidents.

A

Threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ‘vulnerability’ refer to in cybersecurity?

A

A weakness in a system that can be exploited by threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multiple Choice: Which factor is NOT typically considered when assessing the severity of an incident? A) Data sensitivity B) Financial impact C) Time of day D) Compliance requirements

A

C) Time of day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What role does communication play in incident response?

A

Effective communication ensures all stakeholders are informed and coordinated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: Documentation is unimportant during the incident response process.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between a threat and a vulnerability?

A

A threat is a potential danger, while a vulnerability is a weakness that can be exploited.

17
Q

Fill in the blank: A ______ is a documented plan for responding to different types of incidents.

A

incident response plan.

18
Q

What is the main goal of incident mitigation?

A

To reduce the impact of security incidents on the organization.

19
Q

Multiple Choice: Which of the following is considered a proactive security measure? A) Incident reporting B) Security training C) Post-incident review D) None of the above

A

B) Security training.

20
Q

What is the function of an incident severity matrix?

A

To categorize incidents based on their impact and urgency.

21
Q

True or False: All security incidents require immediate escalation.

22
Q

What should be included in an incident report?

A

Details of the incident, response actions taken, and lessons learned.

23
Q

Fill in the blank: After an incident, organizations should conduct a ______ to identify improvements.

A

post-mortem analysis.

24
Q

What is a common tool used for tracking incidents?

A

Incident management software.

25
Multiple Choice: Which of the following is a common indicator of a security incident? A) Unusual network traffic B) Routine system updates C) Scheduled maintenance D) None of the above
A) Unusual network traffic.
26
What is the importance of training employees in security awareness?
To reduce the likelihood of human error leading to security incidents.