Quiz: Module 04 Flashcards

1
Q

The committees of the CPMT follow a set of general stages to develop their subordinate plans. In the case of incident planning, the first stage is to ____.
a. develop the IR planning policy
b. form the IR planning team
c. integrate the BIA
d. identify preventive controls

A

b. form the IR planning team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ____ department of an organization needs to be briefed on what information should be disclosed to the public if an incident occurs.
a. human resources
b. information technology
c. legal
d. public relations

A

d. public relations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In contingency planning, an adverse event that threatens the security of an organization’s information is called a(n) ____.
a. warning
b. incident
c. notification
d. emergency

A

b. incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Should an incident begin to escalate, the CSIRT team leader continues to add resources and skill sets as necessary to attempt to contain and terminate the incident. The resulting team is called the CSIRT ____ for this particular incident.
a. incident squad x
b. reaction force
c. forensic team
d. response unit x

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The training delivery method with the lowest cost to the organization is ____.
a. one-on-one
b. user support group
c. self-study (noncomputerized)
d. on-the-job training

A

c. self-study (noncomputerized)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Organizing the incident response planning process begins with staffing the disaster recovery committee.
a. True
b. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack scenario is a description of a typical attack, including its methodology, indicators, and broad consequences.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In contingency planning, an adverse event that actually threatens the security of the organization’s information assets is called an incident.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The CSIRT reaction force is the name given to the entire computer security incident response team.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A recommended practice for implementation of a hard-copy IR plan document is to attach copies of relevant documents such as service agreements for the ISP, telephone, water, and gas.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly