Deck 8: Reacting to a Cyber Incident: Communication and Incident Recovery

ملء الشاشة (f)
exit full mode
سؤال
Which of the following U.S. laws helps to protect healthcare information?

A) HIPAA
B) Sarbox, or SOX
C) GLBA
D) FISMA
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Due to a lack of comprehensive federal regulations for data breach notification, many states have amended their own laws, and no two state laws are the same.
سؤال
What federal legislation protects user data in Canada?
سؤال
Which of the following companies had 3 billion of its user accounts hacked in 2013 and 2014?

A) Verizon
B) AT&T
C) Google
D) Yahoo
سؤال
_______________ are people with an interest or concern in the organization's actions; unless necessary, communication about a cyber incident should be restricted to them.
سؤال
Which of the following containment techniques permits the device to continue functioning and redirects all network communication to a sinkhole so that evidence may continue to be gathered and malware analyzed?

A) Isolation
B) Removal
C) Reverse engineering
D) Segmentation
سؤال
Which of the following is not considered a difficulty in determining whether a cyber incident has occurred?

A) Inaccurate security indicators
B) Management interference
C) Lack of multiple clear symptoms
D) Faulty human statements
سؤال
A review of the change control process and update to the incident response plan should result in a formal written document known as a ________________, which should include all weaknesses that were uncovered and the changes made to address them.
سؤال
After a hard drive has been sanitized, what process can be used to restore the drive by installing the operating system, application programs, and data files?

A) Imaging
B) Reimaging
C) Reconstruction
D) Patching
سؤال
What is the term for slicing a hard drive into small pieces using 40,000 pounds of force?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Reacting to a Cyber Incident: Communication and Incident Recovery
1
Which of the following U.S. laws helps to protect healthcare information?

A) HIPAA
B) Sarbox, or SOX
C) GLBA
D) FISMA
HIPAA
2
Due to a lack of comprehensive federal regulations for data breach notification, many states have amended their own laws, and no two state laws are the same.
True
3
What federal legislation protects user data in Canada?
The Personal Information Protection and Electronic Documents Act (PIPEDA)
4
Which of the following companies had 3 billion of its user accounts hacked in 2013 and 2014?

A) Verizon
B) AT&T
C) Google
D) Yahoo
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
_______________ are people with an interest or concern in the organization's actions; unless necessary, communication about a cyber incident should be restricted to them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following containment techniques permits the device to continue functioning and redirects all network communication to a sinkhole so that evidence may continue to be gathered and malware analyzed?

A) Isolation
B) Removal
C) Reverse engineering
D) Segmentation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is not considered a difficulty in determining whether a cyber incident has occurred?

A) Inaccurate security indicators
B) Management interference
C) Lack of multiple clear symptoms
D) Faulty human statements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
A review of the change control process and update to the incident response plan should result in a formal written document known as a ________________, which should include all weaknesses that were uncovered and the changes made to address them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
After a hard drive has been sanitized, what process can be used to restore the drive by installing the operating system, application programs, and data files?

A) Imaging
B) Reimaging
C) Reconstruction
D) Patching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
What is the term for slicing a hard drive into small pieces using 40,000 pounds of force?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.