Quiz: Incident Response and Disaster Recovery Post-Assessment Quiz Flashcards
The selection of a strategy to address residual risk is referred to as risk _____.
a. assessment
b. management
c. treatment
d. governance
c. treatment
Information assets that are maintained such that the information is whole, complete, and uncorrupted is considered to have _____________.
a. Reliability
b. Integrity
c. Availability
d. Stability
b. Integrity
The investigation and assessment of the effects that various events or incidents can have on the organization is referred to as _____________________.
a. Contingency Planning
b. Business Impact Analysis
c. Risk Assessment
d. Business Process Management
b. Business Impact Analysis
Which of the following is not one of the categories of unethical behavior that organizations typically try to eliminate?
a. Collusion
b. Ignorance
c. Malicious intent
d. Accident
a. Collusion
Which of the following is not one of the main strategies for data backup and recovery?
a. Tape backup
b. Hypervisors
c. Mirrored systems and disk replication
d. Cloud backup technologies
b. Hypervisors
A resumption strategy that frequently includes computing equipment and peripherals with servers, but not client workstations, and applications are typically not included, not installed, or not configured is called a ______________.
a. Warm site
b. Shared site
c. Cold site
d. Hot site
a. Warm site
The process to review, analyze, and document the activities of an incident response is called the _____________.
a. “right of bang” phase
b. after-action review
c. forensic analysis report
d. “left of bang” phase
b. after-action review
Incident response plan testing can be accomplished by which of the following approaches?
a. Desk check
b. Full-interruption testing
c. Table-top exercise
d. All of the above.
d. All of the above.
An organization that needs to bring in security expertise from an outside vendor might choose to utilize a(n) _____________________.
a. managed security service provider
b. cloud security provider
c. managed security source provider
d. external incident manager
a. managed security service provider
A clear and succinct statement that makes all involved aware of the CSIRT’s purpose and provides a path to obtaining its goals is called its ________________________.
a. vision statement
b. incident response plan
c. project plan
d. mission statement
d. mission statement
Which of the following is not a key part of the cyber kill chain?
a. Actions on the objective
b. Social engineering
c. Weaponization
d. Command and control
b. Social engineering
An event that does not rise to the level of an incident is referred to as ______________.
a. a false negative
b. an alert
c. distraction
d. noise
d. noise
Which of the following is not a part of a typical SIEM?
a. Advanced threat detection and analytics
b. User monitoring
c. Log file monitoring
d. Threat intelligence
c. Log file monitoring
Which of the following is an example of a valid IDPS location choice?
a. Host
b. Network
c. Wireless
d. All of the above
d. All of the above
The phase of the incident response that seeks to clean up the contamination that inevitably results after an unauthorized access to a system is called _________________.
a. System sweep
b. Analysis
c. Recovery
d. Eradication
d. Eradication