Domain 2: Business Continuity, Disaster Recovery, and Incident Response Flashcards

1
Q

What is the priority of any incident response?

A

To protect life, health, and safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary goal of incident management?

A

To be prepared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the other term for incident management?

A

Crisis Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Every organization must have a _____ that will help preserve business viability and survival.

A

Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where: a person other than an authorized user accesses or potentially accesses personally identifiable information; or an authorized user accesses personally identifiable information for other than an authorized purpose.

A

Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any measurable occurence

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits.

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security event, or combination of events, that constitutes a deliberate security incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization

A

Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image or reputation), organizational assets, individuals, other organizations or the nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Weakness in an information system, system security procedures, internal controls or implementation that could be exploited by a threat

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An unknown vulnerability because it doesn’t fit previously recognizable patterns or method, therefore it doesn’t have risk of detection

A

Zero Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What shapes the incident response process?

A

The vision, mission and strategy of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the components of the incident response plan?

A
  1. Preparation
  2. Detection and Analysis
  3. Containment, Eradication, and Recovery
  4. Post-Incident Activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the first response in the preparation component?

A

Identification of Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should we look out for in the preparation component with regards to data and systems?

A

Single points of failure

17
Q

What must be taken into account when choosing the communication between stakeholders?

A

That the primary method of communication may not always be available

18
Q

In the detection and analysis component, documentation must be?

A

Standardized

19
Q

What is the primary goal of the third component of an incident response plan?

A

Identify and Isolate the attacker.

20
Q

In the post-incident activity, lessons learned must be documented, especially in what cases?

A

When the information compromised is under the protection of the law.

21
Q

Along with the organizational need to establish a _______is the need to create a suitable ______

A

Security Operations Center (SOC);incident response team

22
Q

Many organizations now have a dedicated team responsible for investigating any computer security incidents that take place. They are called?

A

Computer Incident Response Teams or Computer Security Incident Respons Teams

23
Q

When an incident occurs, the response team has four primary responsibilities?

A
  1. Amount and Scope of Damage
  2. Confidential information compromised?
  3. Recovery and Restore Security
  4. Supervises implementation of additional security measures
24
Q

What do you call the list of persons to contact in case of disruption of operations?

A

Phone tree

25
Q

Organizational Support must be given by?

A

Executive Management or Sponsor

26
Q

is the proactive development of procedures to restore business operations after a disaster or other significant disruption to the organization

A

Business Continuity Planning

27
Q

What do you call the hard copy document of the business continuity plan?

A

The Red Book

28
Q

How often should an organization test its business continuity plan

A

Routinely

29
Q

What is the goal of Business Continuity?

A

Maintaining Critical Business functions of the Organization

30
Q

When an organization’s critical business functions cannot be performed at an acceptable level within a predetermined time frame

A

Disaster

31
Q

What are the main things that Disaster recovery focuses on restoring?

A

IT and Communication Services

32
Q

True or False: Organizations follow one disaster recovery plan to maintain consistent procedures in case of disasters.

A

False. Depending on the size of the organization and the number of people involved in the DRP effort, organizations often maintain multiple types of plan documents, intended for different audiences

33
Q

What are the documents worth considering in the Disaster Recovery Plan?

A
  1. Executive Summary
  2. Department-specific Plans
  3. IT technical guidelines
  4. Full copies of the plan for critical members
  5. Checklists for certain individuals
34
Q

A centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions.

A

Security Operations Center

35
Q

What are the common components of a Business Continuity Plan?

A
  1. BCP Members and contact methods
  2. Checklists
  3. Call Tree and Notification Systems
  4. Guidance for Management
  5. How and when to enact the plan
  6. Contacts for Critical Members of the Supply Chain
36
Q
A