Section 4.8 Flashcards

1
Q

What is a tabletop exercise?

A

Tabletop exercise involves all the stakeholders sitting around a table and logically going through a simulated disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are simulation tests?

A

Simulations are tests that simulate an event such as a Phishing attack, password request and data breaches. It is meant to test the security systems and people in the organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Threat Hunting?

A

Threat Hunting means that the security team is hunting for different vulnerabilities that may be in the system in order to identify it and mitigate it before it is attacked by a hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Digital Forensics?

A

Digital Forensics is the process of collecting and protecting information relating to an intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Legal Hold?

A

A legal hold is a legal technique (using a lawyer) to protect relevant information by informing the company about the type of data that needs to be store and how much of that data needs to be stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of Data Custodians?

A

Data Custodians have access to all of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Chain of Custody?

A

Chain of custody is the process of maintaining the integrity of the data and having a log of whoever accesses the data overtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is E Discovery?

A

E Discovery is the process of collecting, preparing, reviewing, interpreting and producing electronic documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly