Network Flashcards
What is the first step in assessing security threats?
Identifying potential threats and vulnerabilities.
True or False: All security incidents should be treated with the same level of severity.
False.
Fill in the blank: The process of determining the impact of an incident is known as ______.
impact assessment.
What is a common framework used for incident response?
The NIST Cybersecurity Framework.
Which term describes the likelihood of a threat exploiting a vulnerability?
Risk.
What does the acronym CVSS stand for?
Common Vulnerability Scoring System.
Multiple Choice: Which of the following is NOT a phase in the incident response lifecycle? A) Preparation B) Detection C) Reaction D) Recovery
C) Reaction.
What is the purpose of a risk assessment?
To evaluate potential risks and determine how to mitigate them.
True or False: Mitigation strategies should only be implemented after a security incident occurs.
False.
What is a security incident?
An event that compromises the confidentiality, integrity, or availability of information.
Fill in the blank: ______ analysis helps organizations understand the consequences of incidents.
Threat.
What does ‘vulnerability’ refer to in cybersecurity?
A weakness in a system that can be exploited by threats.
Multiple Choice: Which factor is NOT typically considered when assessing the severity of an incident? A) Data sensitivity B) Financial impact C) Time of day D) Compliance requirements
C) Time of day.
What role does communication play in incident response?
Effective communication ensures all stakeholders are informed and coordinated.
True or False: Documentation is unimportant during the incident response process.
False.