Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IT Fundamentals

Block 5 Unit 5 - 20 April 2023

QuestionAnswer
The first thing to do to prepare for handling security incidents within your organization is to make sure you have a/an ___________________________________ in place incident response
The _______________________is responsible for ensuring that all team members know their role when a security incident occurs Team Leader
The _______________________has the technical expertise to assess and identify the scale of the security incident Technical Specialist
The ______________________________knows how to document the entire response process. Document Specialist
The ____________________________knows the laws and regulations that your organization must follow when it comes to computer forensics and incident response. Legal Advisor
The __________________________________should define each team member's roles and responsibilities. The Plan
The incident response plan, a document created by every organization, identifies ________ and ________ users are supposed to report potential security incidents how and when
The incident response plan contains what common elements? 1. identify different types of incidents 2. the job role of each team member
Incident handling staff should preserve integrity of data to allow for further incident ________________? analysis
A/an _______________is any observable occurrence in a system in a system and/or network. It sometimes provides indication that an incident is occurring. event
A/an _______________is an assessed occurrence that actually jeopardizes the confidentiality, integrity, or availability of an information system. incident
If a virus is discovered on a system, the ______________________should isolate the computer from the network first responder
Name the six phases of the cyber incident response process. IAW (AFI) 17-203, Cyber Incident Handling : Preparation Identification Containment Eradication Recovery Follow-Up
A possible event has just occurred on the network. Upon initial analysis you decide to categorize it as a Category 8: Investigating because you cannot yet determine the _____. cause
An incident has just been detected and declared. In the Preliminary Response Actions phase, the incident handling staff must do what with the data to allow for further incident analysis? Containment
Which organization, during the Response and Recovery phase, will develop a Plan of Action & Milestones detailing the required actions to guide system restoration during similar incidents in the future? ______ local CFP
________________________ is a series of analytical steps taken to find out what happened in an incident, to include the root cause. Incidental Analysis
Name the cyber incident process steps for root cause analysis, in order. 1. Gather info 2. Validate the Incident 3. Determine the Operational Impact 4. Coordinate 5. Determine Reporting Requirements
During the Gather Information phase, all involved personnel should _____________ and _____________ all relevant information about the incident for use in incident analysis. identify and collect
During which phase should personnel should continuously review the incident to ensure accuracy? _______________________________ Validate the incident
While investigating a cyber incident, who should you coordinate with during the process? _____________________________________________________________________________ The AF-DAMO, the CORA, or other orgs.
A Cyber Incident Report provides a detailed analysis, including the affected system, probable attacker, attack vector used, and ________________ and ________________ impacts. technical and operational impacts
Data captured in the ____________________ includes lessons learned, initial root cause, problems with executing courses of action (COAs), missing policies and procedures, and inadequate infrastructure defenses Postmortem
What report identifies and incident, group of incidents, or network activity or on a foreign individual, group, or organization identified as a threat or potential threat to DOD networks? _________________________________________________ Network Intelligence Report (NIR)
Created by: merrellm
Popular Military sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards