Search Header Logo
Mod 9

Mod 9

Assessment

Presentation

Computers

University

Practice Problem

Easy

Created by

Nicole Behner

Used 5+ times

FREE Resource

53 Slides • 31 Questions

1

media

2

media

3

Open Ended

How do you think the process of incident recovery can impact an organization's overall cybersecurity strategy?

4

Multiple Choice

Why is it important for the CSIRT to assess the full extent of damage after an incident has been contained?

1

To determine what must be done to restore systems

2

To punish those responsible for the incident

3

To notify law enforcement

4

To ignore minor damages

5

media

6

Multiple Choice

Which of the following is the initial step in the recovery process after a security incident?

1

Incident damage assessment

2

Restoring data from backups

3

Validating security controls

4

Identifying and fixing vulnerabilities

7

media

8

Multiple Select

Which of the following are main goals of the recovery phase after an incident?

1

Identify and fix vulnerabilities

2

Restore affected data and systems

3

Re-enable affected business processes

4

Install new software unrelated to the incident

9

Open Ended

Explain why documentation, communication, and validation are emphasized during the recovery process after a security incident.

10

media

11

Fill in the Blanks

12

media

13

Open Ended

Describe the role of digital forensics in identifying and resolving vulnerabilities after a security incident.

14

media

15

media

16

Multiple Select

Which of the following best practices should be followed during data restoration to avoid reintroducing compromised files or malware?

1

Verify that backup data was not infected

2

Conduct hash checks to ensure data integrity

3

Use offline or immutable backups whenever possible

4

Restore all files without verification

17

media

18

media

19

Open Ended

Describe how real-time monitoring contributes to the prevention of reinfection attempts after restoring business services.

20

Multiple Choice

Which of the following is a key step in restoring services and processes after a cybersecurity incident?

1

Delaying business continuity operations

2

Ignoring penetration testing

3

Conducting staged activation of systems

4

Disabling real-time monitoring

21

media

22

Open Ended

Explain why restoring confidence across the organization after an incident is not just a technical challenge.

23

media

24

Multiple Choice

Incident response plans must be updated to match which of the following changes?

1

New technologies and threat vectors

2

Changes in staff or leadership

3

Updated legal or compliance obligations

4

All of the above

25

media

26

Fill in the Blanks

27

media

28

Multiple Choice

What is the primary purpose of examining documentation during an After-Action Review (AAR)?

1

To assign blame for mistakes

2

To reveal the timeline and response to the incident

3

To punish underperforming staff

4

To ignore lessons learned

29

media

30

Multiple Choice

Which of the following is a benefit of using the After-Action Review (AAR) as a historical record of events?

1

It helps in establishing a timeline of events from multiple sources.

2

It ensures immediate recovery of data and systems.

3

It prevents future incidents from occurring.

4

It eliminates the need for CSIRT response.

31

media

32

Multiple Choice

How does studying AAR reports from past incidents help new members of an IR team?

1

It makes them experts in all security technologies.

2

It familiarizes them with the system, plans, and responses of the organization.

3

It guarantees they will never make mistakes.

4

It allows them to avoid all future incidents.

33

media

34

Multiple Choice

Why is an after-action review (AAR) valuable?

1

It can be used to document lessons learned and generate improvements to the IR plan.

2

It can provide a historical record of events.

3

It formally brings the IR team’s actions to a close after an incident.

4

All of the above are true.

35

media

36

Fill in the Blanks

37

media

38

Multiple Choice

Which of the following are important components of an effective training plan for incident response?

1

Provisioning of actual or contingent credentials

2

Cross-training of staff members

3

Ensuring a sufficient pool of qualified staff

4

All of the above

39

Multiple Choice

CSIRT Team member training __________.

1

should include cross-training of members

2

should ensure that all people on the team are individually trained to only perform their job

3

includes training for all personnel of the team to handle public press briefings

4

includes training for all personnel to be highly proficient in linux and penetration testing

40

media

41

Open Ended

How do rehearsals, such as tabletop exercises and red team drills, contribute to the effectiveness of a CSIRT team?

42

media

43

Multiple Select

Which of the following are advantages of involving law enforcement agencies during a serious incident?

1

Better equipped at processing evidence than business organizations

2

Can handle warrants and subpoenas

3

May do more harm than good when extracting information

4

Adept at obtaining statements and required documents

44

Multiple Choice

When must an organization notify law enforcement authorities about an incident?

1

Only if requested by law enforcement

2

Whenever there is a data breach

3

When evidence is lost

4

When an incident violates civil or criminal law

45

Open Ended

What are some potential disadvantages for organizations when involving law enforcement in incident response?

46

Multiple Choice

Breach notification requirements in the Gramm-Leach-Bliley (GLB) Act apply to __________.

1

Healthcare organizations

2

Financial institutions

3

Breaches of government

4

Private industries

47

media

48

media

49

media

50

media

51

media

52

media

53

media

54

media

55

Multiple Choice

Forensics involves the collection and presentation of materials in a legal proceeding, usually called "evidence," but only what a judge admits in court can truly be considered evidence; the correct term is ______.

1

evidentiary material

2

legal data

3

collected analysis

4

forensic files

56

media

57

media

58

media

59

Multiple Choice

A digital investigation begins with _____.

1

an allegation of wrongdoing

2

collection of digital evidence

3

analysis using digital and electronic forensic techniques

4

a grand jury investigation

60

media

61

media

62

media

63

media

64

media

65

media

66

media

67

media

68

media

69

media

70

media

71

media

72

media

73

media

74

media

75

media

76

Multiple Choice

After the incident, _______.

1

safeguards can be removed, and business may resume as it had previously

2

controls that had been insufficient before the incident must be replaced, upgraded, or fixed

3

restore previous monitoring capabilities

4

outsource all monitoring and response processes

77

Open Ended

Identify some common certifications for digital forensic practitioners:

78

media

79

media

80

media

81

media

82

media

83

Fill in the Blanks

84

Open Ended

Reflecting on today's lesson about incident recovery, what is one key step you would take if you were part of a CSIRT team responding to a security incident?

media

Show answer

Auto Play

Slide 1 / 84

SLIDE