Tools for protecting business operations Flashcards

1
Q

SIEM is an acronym for?

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a SIEM tools?

A

An application that collects and analyzes log data to monitor critical activities in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a log?

A

A record of events that occur within an organization’s systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a network protocol analyzer (packet sniffer)?

A

A network protocol analyzer is a tool designed to capture and analyze data traffic in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a playbook?

A

A playbook is a manual that provides details about any operational action, such as how to respond to a security incident. Organizations usually have multiple playbooks documenting processes and procedures for their teams to follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 2 types of playbooks?

A

Chain of custody, and protecting and preserving evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is chain of custody?

A

Chain of custody is the process of documenting evidence possession and control during an incident lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is protecting and preserving evidence?

A

Protecting and preserving evidence is the process of properly working with fragile and volatile digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the order of volatility?

A

A sequence outlining the order of data that must be preserved from first to last. It prioritizes volatile data, which is data that may be lost if the device in question powers off, regardless of the reason. While conducting an investigation, improper management of digital evidence can compromise and alter that evidence. When evidence is improperly managed during an investigation, it can no longer be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the first priority in any investigation?

A

preserving data. You can preserve the data by making copies and conducting your investigation using those copies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly