AWR-169-W Cyber Incident Analysis and Response -
Module 3
An incident symptom may c. A precursor
indicate a future, past, or
current event; an indication
signifies that an incident
may have occurred or be
occurring now, and is a sign
that an
incident may occur in the
future.
Operating systems d. Audit
cybersecurity logs generally
record system events and
________ records.
Types of cyber event false a. Inaccurate reports
alarms and non- security
alerts would include which
of the following?
, Which one of the following b. Using packet sniffers on networks
activities is NOT part of
baselining for incident
analysis?
Cyber event "scope" includes c. Which networks, segments, servers, users, and applications
________________________. have been affected
A resource's "criticality" is d. Its power consumption
based upon all of the
following traits EXCEPT:
Human errors and b. False alarms and/or non-security incidents
inaccurate event reports
are examples of _.
What type of service b. Managed security provider
represents an outsourcing
of the CSIRT function?
Tracking all access to d. PCI
credit card data via cyber
log management is
required under
________.
Cyber event c. Event correlation, using packet sniffers on networks, and
investigation includes event research
which one of the
following activities?
What is an incident a. A sign that an incident may occur in the future
precursor?
"Which resources may be a. Effect
affected, and to what
degree," are part of an
incident's
________.
In regard to IT system a. Applications
components, event
monitoring and detection
are applied to networks,
operating systems, and___.
Module 3
An incident symptom may c. A precursor
indicate a future, past, or
current event; an indication
signifies that an incident
may have occurred or be
occurring now, and is a sign
that an
incident may occur in the
future.
Operating systems d. Audit
cybersecurity logs generally
record system events and
________ records.
Types of cyber event false a. Inaccurate reports
alarms and non- security
alerts would include which
of the following?
, Which one of the following b. Using packet sniffers on networks
activities is NOT part of
baselining for incident
analysis?
Cyber event "scope" includes c. Which networks, segments, servers, users, and applications
________________________. have been affected
A resource's "criticality" is d. Its power consumption
based upon all of the
following traits EXCEPT:
Human errors and b. False alarms and/or non-security incidents
inaccurate event reports
are examples of _.
What type of service b. Managed security provider
represents an outsourcing
of the CSIRT function?
Tracking all access to d. PCI
credit card data via cyber
log management is
required under
________.
Cyber event c. Event correlation, using packet sniffers on networks, and
investigation includes event research
which one of the
following activities?
What is an incident a. A sign that an incident may occur in the future
precursor?
"Which resources may be a. Effect
affected, and to what
degree," are part of an
incident's
________.
In regard to IT system a. Applications
components, event
monitoring and detection
are applied to networks,
operating systems, and___.