Quiz: Incident Response and Disaster Recovery Post-Assessment Quiz Flashcards

1
Q

The selection of a strategy to address residual risk is referred to as risk _____.
a. assessment
b. management
c. treatment
d. governance

A

c. treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information assets that are maintained such that the information is whole, complete, and uncorrupted is considered to have _____________.
a. Reliability
b. Integrity
c. Availability
d. Stability

A

b. Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The investigation and assessment of the effects that various events or incidents can have on the organization is referred to as _____________________.
a. Contingency Planning
b. Business Impact Analysis
c. Risk Assessment
d. Business Process Management

A

b. Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not one of the categories of unethical behavior that organizations typically try to eliminate?
a. Collusion
b. Ignorance
c. Malicious intent
d. Accident

A

a. Collusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is not one of the main strategies for data backup and recovery?
a. Tape backup
b. Hypervisors
c. Mirrored systems and disk replication
d. Cloud backup technologies

A

b. Hypervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A resumption strategy that frequently includes computing equipment and peripherals with servers, but not client workstations, and applications are typically not included, not installed, or not configured is called a ______________.
a. Warm site
b. Shared site
c. Cold site
d. Hot site

A

a. Warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process to review, analyze, and document the activities of an incident response is called the _____________.
a. “right of bang” phase
b. after-action review
c. forensic analysis report
d. “left of bang” phase

A

b. after-action review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Incident response plan testing can be accomplished by which of the following approaches?
a. Desk check
b. Full-interruption testing
c. Table-top exercise
d. All of the above.

A

d. All of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An organization that needs to bring in security expertise from an outside vendor might choose to utilize a(n) _____________________.
a. managed security service provider
b. cloud security provider
c. managed security source provider
d. external incident manager

A

a. managed security service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A clear and succinct statement that makes all involved aware of the CSIRT’s purpose and provides a path to obtaining its goals is called its ________________________.
a. vision statement
b. incident response plan
c. project plan
d. mission statement

A

d. mission statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not a key part of the cyber kill chain?
a. Actions on the objective
b. Social engineering
c. Weaponization
d. Command and control

A

b. Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An event that does not rise to the level of an incident is referred to as ______________.
a. a false negative
b. an alert
c. distraction
d. noise

A

d. noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not a part of a typical SIEM?
a. Advanced threat detection and analytics
b. User monitoring
c. Log file monitoring
d. Threat intelligence

A

c. Log file monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an example of a valid IDPS location choice?
a. Host
b. Network
c. Wireless
d. All of the above

A

d. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The phase of the incident response that seeks to clean up the contamination that inevitably results after an unauthorized access to a system is called _________________.
a. System sweep
b. Analysis
c. Recovery
d. Eradication

A

d. Eradication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attack that is designed to prevent the legitimate users of a system or network from using it is called _____________________.
a. social engineering
b. unauthorized access
c. a DOS attack
d. malware

A

c. a DOS attack

17
Q

The determination of the initial flaw or vulnerability that allowed an incident to occur is called _____________.
a. system and network analysis
b. log file analysis
c. source problem analysis
d. root cause analysis

A

d. root cause analysis

18
Q

The first phase of the recovery process is to:
a. identify and resolve vulnerabilities
b. restore processes and services
c. restore confidence in the organization
d. restore data

A

a. identify and resolve vulnerabilities

19
Q

A disaster that occurs over time and gradually deteriorates the organization’s capacity to withstand its effects is known as a ____________________.
a. slow-onset disaster.
b. natural disaster.
c. man-made disaster.
d. communication disaster.

A

a. slow-onset disaster.

20
Q

The point at which management responds to a notification of an impending or ongoing disaster, such as a weather report or an activity report from IT indicating the escalation of an incident, is called the _______________.
a. launch.
b. trigger.
c. activation.
d. disaster initiation.

A

b. trigger.

21
Q

Immediately after the BC planning policy statement, the next document the BC plan development team should review is the _________________.
a. BIA
b. CIA
c. DRP
d. BCP

A

a. BIA

22
Q

Potential shortfalls from the original BC planning process might include which of the following?
a. Prioritization issues.
b. Security issues.
c. Ownership changes.
d. All of the above.

A

d. All of the above.

23
Q

The position of the executive-in-charge of a crisis response is defined by the _______________.
a. succession plan.
b. organization chart.
c. chain of command.
d. management structure.

A

c. chain of command.

24
Q

Which of the following is not a method for training employees to handle a wide range of roles in the organization after a crisis?
a. Personnel redundancy
b. Vertical job rotation
c. Vendor rotation
d. Horizontal job rotation

A

c. Vendor rotation

25
Q

All of the following agencies publish well-respected standards and guidelines for incident response and disaster recovery except:
a. ISO
b. FFIEC
c. NSA
d. NIST

A

c. NSA