CJCSM 6510.01B, Encl. B Flashcards

1
Q

What is the DoD system of record for lessons learned?

A

JLLIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary vehicle for reporting and recording all cyber incidents and reportable events?

A

JIMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security classifications of cyber incidents are determined in accordance with which publication?

A

DoDI O-3600.02

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many different types of initial cyber incident reporting are there?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the minimum security requirement when sending e-mails reporting a cyber incident?

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What includes the coordinated and initial actions taken to protect the information network or IS from any further malicious activity and to acquire the data required fro further analysis?

A

Preliminary response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What will Cyber incident containment be coordinated with?

A

CNDSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of data is RAM considered?

A

Volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of data are system images and malware considered to be?

A

Persistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of data is the configuration around the system considered to be?

A

Environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is defined as a series of analytical steps taken to find out what happened in an incident?

A

Cyber incident analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should any software artifacts suspected of being malware be submitted to?

A

Joint Malware Catalog (JMC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary path or method used by the adversary to cause the cyber incident or even to occur?

A

Delivery vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What expands upon the identified delivery vectors and system weaknesses by precisely identifying the
sets of conditions allowing the incident to occur?

A

Root cause identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What refers to an incident’s detrimental impact on the technical capabilities of the organization?

A

Technical Impact (TI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What refers to a detrimental impact on an organization’s ability to perform its mission?

A

Operational Impact (OI)

17
Q

What must actions that potentially affect traffic on the DoD Protected Traffic List be coordinated with?

A

USCYBERCOM

18
Q

What involves understanding and accurately characterizing the relationship of incidents reported and providing awareness of the cyber security trends as observed by the affected parties? (Page

A

Trending analysis

19
Q

ISs having which categories of cyber incidents must be rebuilt from trusted media and have up-to-date
AV software loaded and configured IAW STIGs and WARNORDs prior to connecting the IS to the
information network?

A

1, 2, and 7

20
Q

What is used to document the technical and operational impact of the cyber incident on the organization?

A

BDA

21
Q

Within how many hours after the cyber incident has been resolved must the JIMS incident record be
updated with the BDA?

A

24

22
Q

What are lessons learned, initial root cause, problems with executing COAs, and missing policies and
procedures all part of?

A

Post-incident analysis

23
Q

Where are cyber incidents sent that require a postmortem?

A

USCYBERCOM

24
Q

What is defined as a set of scripts, programs, and other resources used to safely acquire, examine, and
preserve volatile and non volatile data from an IS?

A

First responder toolkit