exam questions

Exam 350-201 All Questions

View all questions & answers for the 350-201 exam

Exam 350-201 topic 1 question 25 discussion

Actual exam question from Cisco's 350-201
Question #: 25
Topic #: 1
[All 350-201 Questions]

DRAG DROP -
Drag and drop the NIST incident response process steps from the left onto the actions that occur in the steps on the right.
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:
Reference:
https://www.securitymetrics.com/blog/6-phases-incident-response-plan

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Keannan
Highly Voted 1 year, 7 months ago
For me answer is wrong. According to: https://www.cynet.com/incident-response/nist-incident-response/ For me correct answer is: Eradicate - Eliminate the root cause of the breach and apply updates to the system Contain - Determine where the breach started and prevent the attack from spreading Post-Incident Handling - Analyze and document the breach and strengthen systems against future attacks Recover - Get systems and business operations up and running and ensure that the same type of attack does not occur again Analyze - Determine how the breach was discovered and the areas that are impacted Prepare - Conduct incident response role training for employees
upvoted 9 times
...
DrVoIP
Most Recent 3 months, 4 weeks ago
The steps and the corresponding actions that occur at each step are: Prepare: Conduct incident response role training for employees. Analyze: Determine how the breach was discovered and the areas that were impacted. Contain: Determine where the breach started and prevent the attack from spreading. Eradicate: Eliminate the root cause of the breach and apply updates to the system. Recover: Get systems and business operations up and running and ensure that the same type of attack does not occur again. Post-incident handling: Review and document the breach and strengthen systems against future attacks. Note that these steps follow the NIST incident response framework, which provides a systematic approach to responding to cybersecurity incidents. The actions listed for each step are intended to help organizations respond to cybersecurity incidents efficiently and effectively. - ChatGPT
upvoted 2 times
...
TOLU1985
8 months, 3 weeks ago
Agree with Keannan anwers. ADMIN DO SOMETHING STOP DELETING MESSAGES.
upvoted 1 times
...
kyle942
9 months ago
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf Preparation Detect and ANALYZE Containment Eradicate Recovery Post-Incident Activity
upvoted 1 times
...
maxson69
1 year, 6 months ago
Keannan is correct. The answer is wrong. Keannan's one is all correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago