Bash, the Crucial Exams Chat Bot
AI Bot

Security Operations, Monitoring, and Incident Response (CCST) Flashcards

Cisco CCST Cybersecurity 100-160 Flashcards

Study our Security Operations, Monitoring, and Incident Response (CCST) flashcards for the Cisco CCST Cybersecurity 100-160 exam with 51+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Cisco CCST Cybersecurity 100-160 Course Header Image
FrontBack
Best practice for forensic imagingCreate a bit for bit copy using write blockers and verify checksums
Chain of custody importanceEnsures evidence integrity admissibility and traceability during investigations
Containment strategies short termIsolate host block network access and disable accounts
Data privacy considerations during IRMinimize access to personal data and follow retention and disclosure laws
Define escalation matrixPredefined contacts and thresholds for escalating incidents to higher teams
Define evidence preservation orderCollect most volatile data first then less volatile items later
Define false negativeMalicious activity that goes undetected by security controls
Define false positiveAlert that incorrectly signals malicious activity when none exists
Define nonvolatile evidencePersistent data on disk removable media or logs retained after reboot
Define RPORecovery point objective acceptable amount of data loss measured in time
Define RTORecovery time objective target time to restore a function after disruption
Define SIEMCentralized collection normalization correlation and analysis of security events
Define threat huntingProactive search for hidden threats using hypothesis driven investigation
Define volatile evidenceData in memory or running system state lost on power off
Describe a correlation ruleLogic that links multiple events across sources to detect complex incidents
Difference between intel feed typesStrategic tactical and operational feeds vary by detail and timeliness
Evidence handling best practiceDocument collect preserve and transfer evidence using chain of custody
First phase of incident responsePreparation activities including policies training and tooling setup
HIDS vs NIDSHost based monitors individual systems NIDS monitors network traffic
Importance of backups regular testingBackups must be frequent tested and protected to enable reliable recovery
Key metrics for SOC performanceMTTA MTTR number of incidents and false positive rate
Log retention considerationsCompliance storage cost privacy and forensic needs determine retention periods
Malware sandboxing purposeExecute suspicious files in isolated environment to observe behavior safely
Name common log sourcesEndpoints firewalls IDS proxies and servers
Network segmentation benefitLimit lateral movement reduce blast radius and simplify containment
Next phase after detectionContainment actions to limit scope and prevent further damage
Purpose of a post incident reviewIdentify lessons learned improve controls and update response plans
Purpose of MITRE ATTCK mappingStandardize adversary behaviors for detection and analysis
Purpose of NTP and time syncEnsure consistent timestamps across systems for accurate correlation and forensics
Role of IDSDetect suspicious network or host activity and alert analysts
Signature detection vs anomaly detectionSignature matches known patterns anomaly detects deviations from normal behavior
What are TTPsTactics Techniques and Procedures used by adversaries to achieve objectives
What belongs in an incident reportSummary timeline impact root cause remediation and recommended actions
What is a hypothesis in threat huntingA testable assumption about possible malicious activity to investigate
What is a playbookPredefined sequence of response steps for a specific incident type
What is a runbookOperational checklist for executing technical procedures during response
What is a security baselineA documented expected configuration used to detect deviations and drift
What is a SOC playbookOperational guidance for SOC analysts on detecting triage and response workflows
What is alert triageProcess of validating classifying prioritizing and assigning alerts for investigation
What is an enrichment in SIEMAugmenting raw events with context such as user asset or threat intelligence
What is an IOAIndicator of attack behavioral evidence showing attacker techniques and intent
What is an IOCIndicator of compromise observable artifact such as IP address file hash or domain
What is an IOC enrichmentAdding context like geolocation whois or reputation to observed indicators
What is containmentShort term actions to limit impact and isolate affected assets
What is eradicationRemoving malware artifacts closing vulnerabilities and restoring integrity
What is legal holdOrder to preserve potential evidence and prevent destruction during investigations
What is log normalizationConverting diverse log formats into a common structured schema
What is recoveryRestoring systems to production and validating normal operation
What is threat intelligenceInformation about threat actors indicators and malicious infrastructure
Why is time synchronization importantAccurate timestamps enable reliable event correlation and timeline reconstruction
Why tune SIEM rulesReduce false positives improve performance and focus analyst time on real threats

About the Flashcards

Flashcards for the Cisco CCST Cybersecurity exam help students master core terminology and operational practices for security monitoring and incident response. The deck reviews SIEM fundamentals such as log collection, normalization, enrichment, correlation rules, time synchronization, and rule tuning, alongside common log sources and SOC performance metrics analysts use to evaluate detection effectiveness.

Also covered are detection concepts like IOC and IOA, signature versus anomaly detection, alert triage, threat hunting and MITRE ATT&CK mapping, and practical response procedures from preparation through containment, eradication, and recovery. Forensics and evidence handling topics include volatile versus nonvolatile data, chain of custody, forensic imaging best practices, legal hold, and data privacy considerations.

Topics covered in this flashcard deck:

  • SIEM operations and tuning
  • Log collection and normalization
  • IOC and IOA detection
  • Incident response phases
  • Digital forensics and evidence
  • Threat hunting and MITRE ATT&CK
Share on...
Follow us on...