Deck 7: Reacting to a Cyber Incident: Impact and Forensics

Full screen (f)
exit full mode
Question
What is the term for the amount of time an incident interrupts normal business processes?
Use Space or
up arrow
down arrow
to flip the card.
Question
The majority of U.S. organizations are considered "cyber-ready" to defend themselves against attacks.
Question
Which U.S. Cabinet Secretary introduced many Americans to the concepts of known knowns and known unknowns?

A) Alexander Haig
B) Colin Powell
C) Condoleezza Rice
D) Donald Rumsfeld
Question
A person's name, Social Security number, driver's license number, bank account number, and passport number are examples of ______________.
Question
Which phase of a cyber incident response plan has the goal of permitting affected systems back into the production environment?

A) Analysis
B) Recovery
C) Follow-up
D) Containment
Question
A ____________ is a more targeted version of a brute force attack that uses placeholders for characters in certain positions of the password; its goal is to speed up the cracking process by reducing the number of potential candidates that must be created.
Question
Which is the following is not considered an element of a forensics kit?

A) Write blocker
B) IDS
C) digital forensic workstation
D) cables and drive adapters
Question
What type of attack conducts a statistical analysis on passwords and then uses it to create a mask in an attempt to break the largest number of possible passwords.

A) Mask attack
B) Brute force attack
C) Dictionary attacks
D) Rule attack
Question
The primary tool in a forensics kit is a _______________, which is specially configured to perform forensics activities.
Question
Which of the following forms in a forensics kit helps to document that evidence was under strict control at all times?

A) Incident form
B) Chain of custody form
C) Incident response from
D) Call/escalation list
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Reacting to a Cyber Incident: Impact and Forensics
1
What is the term for the amount of time an incident interrupts normal business processes?
Downtime
2
The majority of U.S. organizations are considered "cyber-ready" to defend themselves against attacks.
False
3
Which U.S. Cabinet Secretary introduced many Americans to the concepts of known knowns and known unknowns?

A) Alexander Haig
B) Colin Powell
C) Condoleezza Rice
D) Donald Rumsfeld
D
4
A person's name, Social Security number, driver's license number, bank account number, and passport number are examples of ______________.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
Which phase of a cyber incident response plan has the goal of permitting affected systems back into the production environment?

A) Analysis
B) Recovery
C) Follow-up
D) Containment
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
A ____________ is a more targeted version of a brute force attack that uses placeholders for characters in certain positions of the password; its goal is to speed up the cracking process by reducing the number of potential candidates that must be created.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
Which is the following is not considered an element of a forensics kit?

A) Write blocker
B) IDS
C) digital forensic workstation
D) cables and drive adapters
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
What type of attack conducts a statistical analysis on passwords and then uses it to create a mask in an attempt to break the largest number of possible passwords.

A) Mask attack
B) Brute force attack
C) Dictionary attacks
D) Rule attack
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
The primary tool in a forensics kit is a _______________, which is specially configured to perform forensics activities.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following forms in a forensics kit helps to document that evidence was under strict control at all times?

A) Incident form
B) Chain of custody form
C) Incident response from
D) Call/escalation list
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.