100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CTI2 Study Guide_ Enclosure B $7.99   Add to cart

Exam (elaborations)

CTI2 Study Guide_ Enclosure B

 7 views  0 purchase
  • Course
  • CTI - 2024\\2025
  • Institution
  • CTI - 2024\\2025

CTI2 Study Guide_ Enclosure B

Preview 1 out of 2  pages

  • August 24, 2024
  • 2
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CTI - 20242025
  • CTI - 20242025
avatar-seller
CHichii
CTI2 Study Guide: Enclosure B
1, 2, and 7 - ANS-IS's having which categories of cyber incidents must be rebuilt from trusted
media and have up-to-date AV software loaded and configured in accordance with STIG's and
wernords prior to connecting the IS to the information network?

2 - ANS-how many different types of initial cyber incident reporting are there?

24 - ANS-within how many hours of the cyber incident that has been resolved must the JIMS
incident record be updated with the BDA?

BDA - ANS-what is a used document that technical and operational impact of the cyber incident
on the organization?

CNDSP - ANS-what will cyber incident containment be coordinated with?

cyber incident analysis - ANS-what is defined as a series of analytical steps taken to find out
what happened in an incident?

delivery vector - ANS-what is the primary path or method used by the adversary to cause the
cyber incident or event to occur?

digital signature - ANS-what is the minimum security requirement when sending emails reporting
cyber incidents?

DODIO-3600.02 - ANS-security classifications of cyber incidents are determined in accordance
with which publication?

environmental - ANS-which type of data is the configuration around the system considered to
be?

first responder tool kit - ANS-what is defined as a set of scripts, programs, and other resources
used to safely acquire, examine, and preserve volatile and non-volatile data from an IS?

JIMS - ANS-what is the primary vehicle for reporting and recording all cyber incidents and
reportable events?

JLLIS - ANS-what is the DOD system of record for lessons learned?

joint malware catalog (JMC) - ANS-what should any software artifact suspected of being
malware be submitted to?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller CHichii. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75057 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart