6.4.11 Check Your Understanding – Identify the Incident
In this article i am gone to share Cyber Threat Management | Digital Forensics and Incident Analysis and Response | 6.4.11 Check Your Understanding – Identify the Incident Handling Term Quiz Answer with you..
Digital Forensics and Incident Analysis and Response
Also visit this link: 6.4.2 Check Your Understanding – Identify the Incident Response
6.4.11 Check Your Understanding – Identify the Incident Handling Term
Answer the questions to identify the incident handling terms.
Preparing to Attack
Question 1) This is a multiple choice question. Once you have selected an option, select the submit button below
What term is used for a sign that a threat actor maybe be preparing to attack an asset?
- incident
- Precursor
- event
- indicator
- CSIRT
- incident handling
Provide Incident Response
Question 2) This is a multiple choice question. Once you have selected an option, select the submit button below
What term is used for the group of people who provide incident response services to an organization?
- indicator
- Precursor
- incident handling
- incident
- CSIRT
- event
Time-bound Activity
Question 3) This is a multiple choice question. Once you have selected an option, select the submit button below
What term is used for a time-bound activity that is restricted to a specific step in which an adversary attacks a network?
- incident handling
- incident
- security event
- Precursor
- event
- CSIRT
Network Security Event
Question 4) This is a multiple choice question. Once you have selected an option, select the submit button below
What is a sign that a network security event may have occurred or is occurring?
- event
- Precursor
- incident handling
- incident
- indicator
- CSIRT
Threat of Violation
Question 5) This is a multiple choice question. Once you have selected an option, select the submit button below
What has occurred when there is a violation or threat of violation of security policies?
- Precursor
- CSIRT
- indicator
- event
- incident handling
- incident
Address Breaches
Question 6) This is a multiple choice question. Once you have selected an option, select the submit button below
What is the term for a set of policies, plans, and procedures that are designed to address cybersecurity breaches?
- CSIRT
- event
- incident
- incident handling capability
- indicator
- Precursor