Sound the Alarm: Detection and Response: Module 3 Flashcards

(26 cards)

1
Q

Analysis

A

Looking closely at alerts to understand if they’re real.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Broken Chain of Custody

A

When evidence isn’t tracked properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business Continuity Plan (BCP)

A

A plan to keep the business running during big problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chain of Custody

A

Keeping track of who handled the evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Containment

A

Stopping an attack from spreading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crowdsourcing

A

Getting help or information from lots of people online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detection

A

Finding out when something bad happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Documentation

A

Writing down what happened and what was done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Eradication

A

Removing all parts of the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Final Report

A

A full summary of the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Honeypot

A

A fake system to catch attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Incident Response Plan

A

A step-by-step guide for handling attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Indicators of Attack (IoA)

A

Clues showing an attack is happening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Indicators of Compromise (IoC)

A

Signs that a system was attacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intrusion Detection System (IDS)

A

A tool that watches for attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lessons Learned Meeting

A

A meeting to talk about what went wrong and how to improve.

17
Q

Open-Source Intelligence (OSINT)

A

Public info found online that helps in security work.

18
Q

Playbook

A

A guide for what to do during an incident.

19
Q

Post-Incident Activity

A

Looking back after an incident to learn from it.

20
Q

Recovery

A

Getting things back to normal after an attack.

21
Q

Resilience

A

Being ready to deal with problems and bounce back.

22
Q

Standards

A

Rules that guide how things should be done.

23
Q

Threat Hunting

A

Actively looking for hidden threats.

24
Q

Threat Intelligence

A

Useful info about possible threats.

25
Triage
Deciding which alerts are most urgent.
26
VirusTotal
A website to check if files or links are bad.