4.8 - CompTIA Security+

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

Preparation (step one)

The incident response step that involves establishing guidelines/policies to handle security incidents.

2
New cards

Detection (step two)

The process of identifying potential security incidents through monitoring systems and logs.

3
New cards

Analysis (step three)

Evaluating whether a security incident is truly malicious or requires organization attention.

4
New cards

Containment (step four)

Limiting a security incident or breach to affected systems or networks, such as quarantining infected machines.

5
New cards

Eradication (step five)

Removing the source of contamination that caused the security incident.

6
New cards

Recovery (step six)

Restoring systems and operations to normal after a security incident.

7
New cards

Lessons learned (step seven)

Reflecting on how a security incident occurred and implementing changes to prevent future incidents.

8
New cards

Training

Educating staff on actions during a security incident to improve response outcomes.

9
New cards

Tabletop exercise

A scenario-based testing exercise where responders discuss actions to handle threats.

10
New cards

Simulation

A team-based exercise where one team attacks while another responds and recovers.

11
New cards

Root cause analysis

Identifying underlying factors contributing to a security incident for better future strategies.

12
New cards

Threat hunting

Proactively searching for indicators of compromise within a network.

13
New cards

Digital forensics

Post-mortem analysis of an incident to understand its occurrence and root cause.

14
New cards

Legal hold

Data acquisition request that preserves electronically stored information (ESI).

15
New cards

Chain of custody

A legal document that tracks the possession of digital evidence.

16
New cards

Acquisition

The process of obtaining evidence during digital forensics.

17
New cards

Reporting

Providing documentation for the security incident and data acquisition process.

18
New cards

Preservation

Storage of data acquired during digital forensics.

19
New cards

E-discovery

Collecting, preparing, reviewing, and producing electronic documents.