Coursera Answers

6.4.11 Check Your Understanding – Identify the Incident Handling Term

6.4.11 Check Your Understanding - Identify the Incident Handling Term

Cyber Threat Management

Digital Forensics and Incident Analysis and Response

in this article i am gone to share Cyber Threat Management | Digital Forensics and Incident Analysis and Response | 6.4.11 Check Your Understanding – Identify the Incident Handling Term Quiz Answer with you..


6.4.11 Check Your Understanding – Identify the Incident Handling Term

Answer the questions to identify the incident handling terms.


Preparing to Attack

Question 1)

This is a multiple choice question. Once you have selected an option, select the submit button below

What term is used for a sign that a threat actor maybe be preparing to attack an asset?

  • incident
  • Precursor
  • event
  • indicator
  • CSIRT
  • incident handling



Provide Incident Response

Question 2)

This is a multiple choice question. Once you have selected an option, select the submit button below

What term is used for the group of people who provide incident response services to an organization?

  • indicator
  • Precursor
  • incident handling
  • incident
  • CSIRT
  • event



Time-bound Activity

Question 3)

This is a multiple choice question. Once you have selected an option, select the submit button below

What term is used for a time-bound activity that is restricted to a specific step in which an adversary attacks a network?

  • incident handling
  • incident
  • security event
  • Precursor
  • event
  • CSIRT



Network Security Event

Question 4)

This is a multiple choice question. Once you have selected an option, select the submit button below

What is a sign that a network security event may have occurred or is occurring?

  • event
  • Precursor
  • incident handling
  • incident
  • indicator
  • CSIRT




Threat of Violation

Question 5)

This is a multiple choice question. Once you have selected an option, select the submit button below

What has occurred when there is a violation or threat of violation of security policies?

  • Precursor
  • CSIRT
  • indicator
  • event
  • incident handling
  • incident



Address Breaches

Question 6)

This is a multiple choice question. Once you have selected an option, select the submit button below

What is the term for a set of policies, plans, and procedures that are designed to address cybersecurity breaches?

  • CSIRT
  • event
  • incident
  • incident handling capability
  • indicator
  • Precursor