cisco

6.4.11 Check Your Understanding – Identify the Incident

In this article i am gone to shareย Cyber Threat Management | Digital Forensics and Incident Analysis and Responseย | 6.4.11 Check Your Understanding – Identify the Incident Handling Term Quiz Answer with you..

Digital Forensics and Incident Analysis and Response


Also visit this link:ย  6.4.2 Check Your Understanding โ€“ Identify the Incident Response


 

6.4.11 Check Your Understanding – Identify the Incident Handling Term

Answer the questions to identify the incident handling terms.

Preparing to Attack

Question 1) This is a multiple choice question. Once you have selected an option, select the submit button below

What term is used for a sign that a threat actor maybe be preparing to attack an asset?

  • incident
  • Precursor
  • event
  • indicator
  • CSIRT
  • incident handling

 

Provide Incident Response

Question 2) This is a multiple choice question. Once you have selected an option, select the submit button below

What term is used for the group of people who provide incident response services to an organization?

  • indicator
  • Precursor
  • incident handling
  • incident
  • CSIRT
  • event

 

Time-bound Activity

Question 3) This is a multiple choice question. Once you have selected an option, select the submit button below

What term is used for a time-bound activity that is restricted to a specific step in which an adversary attacks a network?

  • incident handling
  • incident
  • security event
  • Precursor
  • event
  • CSIRT

 

Network Security Event

Question 4) This is a multiple choice question. Once you have selected an option, select the submit button below

What is a sign that a network security event may have occurred or is occurring?

  • event
  • Precursor
  • incident handling
  • incident
  • indicator
  • CSIRT

 

Threat of Violation

Question 5) This is a multiple choice question. Once you have selected an option, select the submit button below

What has occurred when there is a violation or threat of violation of security policies?

  • Precursor
  • CSIRT
  • indicator
  • event
  • incident handling
  • incident

 

Address Breaches

Question 6) This is a multiple choice question. Once you have selected an option, select the submit button below

What is the term for a set of policies, plans, and procedures that are designed to address cybersecurity breaches?

  • CSIRT
  • event
  • incident
  • incident handling capability
  • indicator
  • Precursor