
CyberSecurity Training

Flashcard
•
Information Technology (IT)
•
Professional Development
•
Hard
Christopher Lynch
FREE Resource
Student preview

40 questions
Show all answers
1.
FLASHCARD QUESTION
Front
INCIDENCE RESPONSE PROCESS
What is the first step in the incident response process?
Back
Identify and confirm the incident by analyzing logs and alerts.
2.
FLASHCARD QUESTION
Front
INCIDENCE RESPONSE PROCESS
Scenario: A company detects unusual outbound network traffic that could indicate data exfiltration.
Question: What is the first step in the incident response proce
Back
Answer: Identify and confirm the incident by analyzing logs and alerts
3.
FLASHCARD QUESTION
Front
INCIDENCE RESPONSE PROCESS
Scenario: Employees report receiving emails from a compromised internal account requesting sensitive data.
Question: Should this be escalated immediately? Why or why not?
Back
Answer: Yes, because it indicates a potential account takeover and requires immediate containment.
4.
FLASHCARD QUESTION
Front
INCIDENCE RESPONSE PROCESS
Scenario: A ransomware infection has locked multiple workstations. The IT team is unsure whether to shut down affected systems.
Question: What should the team do first—shut down systems or isolate them?
Back
Answer: Isolate them from the network to prevent further spread before taking further action.
5.
FLASHCARD QUESTION
Front
Real World Reporting
The Twitter Bitcoin Scam (2020)
📌 Incident: Attackers gained access to Twitter’s internal tools via a phishing attack on employees, leading to a large-scale scam.
Back
Identify: Weak internal security protocols for employee access.
Protect: Lack of multi-factor authentication on internal admin tools.
Detect: Attack detected only after fraudulent tweets went viral.
Respond: Twitter locked down affected accounts and restricted employee access.
Recover: Twitter improved security policies and employee training.
6.
FLASHCARD QUESTION
Front
INCIDENCE RESPONSE PROCESS
Containment & Mitigation
Scenario: A malware outbreak spreads across an organization’s network. IT blocks external traffic from affected machines.
Question: What additional containment steps should be taken?
Back
Answer: Disable compromised accounts, segment the network, and block malicious IP addresses.
7.
FLASHCARD QUESTION
Front
INCIDENCE RESPONSE PROCESS
Containment and Mitigation
Scenario: A phishing attack compromised employee credentials. The attacker is attempting unauthorized access.
Question: What immediate actions should be taken?
Back
Answer: Force password resets, revoke unauthorized sessions, and monitor for further suspicious activity.
Create a free account and access millions of resources
Similar Resources on Wayground
30 questions
Essential Concepts of Contracts

Flashcard
•
University
30 questions
Phase 2 Final Practice

Flashcard
•
12th Grade
23 questions
Legal and Ethical Terms

Flashcard
•
KG - University
22 questions
SPD Basics Flash Cards

Flashcard
•
Professional Development
37 questions
review sheet question- Internet Vocabulary

Flashcard
•
12th Grade
41 questions
Cybersecurity Core Functions-IR TEAM

Flashcard
•
Professional Development
38 questions
Portrait Lighting Test

Flashcard
•
KG - University
30 questions
Understanding Emergency Services

Flashcard
•
KG - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade