Deck 8: Reacting to a Cyber Incident: Communication and Incident Recovery
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 8: Reacting to a Cyber Incident: Communication and Incident Recovery
1
Which of the following U.S. laws helps to protect healthcare information?
A) HIPAA
B) Sarbox, or SOX
C) GLBA
D) FISMA
A) HIPAA
B) Sarbox, or SOX
C) GLBA
D) FISMA
A
2
Due to a lack of comprehensive federal regulations for data breach notification, many states have amended their own laws, and no two state laws are the same.
True
3
What federal legislation protects user data in Canada?
The Personal Information Protection and Electronic Documents Act (PIPEDA)
4
Which of the following companies had 3 billion of its user accounts hacked in 2013 and 2014?
A) Verizon
B) AT&T
C) Google
D) Yahoo
A) Verizon
B) AT&T
C) Google
D) Yahoo
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
_______________ are people with an interest or concern in the organization's actions; unless necessary, communication about a cyber incident should be restricted to them.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following containment techniques permits the device to continue functioning and redirects all network communication to a sinkhole so that evidence may continue to be gathered and malware analyzed?
A) Isolation
B) Removal
C) Reverse engineering
D) Segmentation
A) Isolation
B) Removal
C) Reverse engineering
D) Segmentation
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is not considered a difficulty in determining whether a cyber incident has occurred?
A) Inaccurate security indicators
B) Management interference
C) Lack of multiple clear symptoms
D) Faulty human statements
A) Inaccurate security indicators
B) Management interference
C) Lack of multiple clear symptoms
D) Faulty human statements
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
A review of the change control process and update to the incident response plan should result in a formal written document known as a ________________, which should include all weaknesses that were uncovered and the changes made to address them.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
After a hard drive has been sanitized, what process can be used to restore the drive by installing the operating system, application programs, and data files?
A) Imaging
B) Reimaging
C) Reconstruction
D) Patching
A) Imaging
B) Reimaging
C) Reconstruction
D) Patching
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
What is the term for slicing a hard drive into small pieces using 40,000 pounds of force?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck