Bash, the Crucial Exams Chat Bot
AI Bot

Incident Response, Monitoring, and Forensics (CCNACBR) Flashcards

Cisco CCNA Cybersecurity 200-201 CCNACBR Flashcards

Study our Incident Response, Monitoring, and Forensics (CCNACBR) flashcards for the Cisco CCNA Cybersecurity 200-201 CCNACBR exam with 79+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Cisco CCNA Cybersecurity 200-201 CCNACBR Course Header Image
FrontBack
Benefit of playbooksSpeed consistency and improved decision making
Best practice for communicating incidents to stakeholdersBe timely factual and avoid speculation
Best practice for timestampsUse NTP and UTC across infrastructure
Common memory analysis toolVolatility
Common severity levelsLow Medium High Critical
Common syslog transport protocolsUDP TCP and TLS
Containment exampleIsolate network segment disable compromised accounts block malicious IPs
Definition of alert triageProcess of validating prioritizing and assigning alerts
EDR common capabilitiesProcess monitoring file activity memory scanning isolation
Eradication tasksRemove malware patch vulnerabilities change credentials rebuild systems
Example correlation ruleMultiple failed logins followed by a successful login from same IP
Examples of IOCsMalicious IPs domains hashes or suspicious registry keys
Examples of volatile dataRAM open network connections running processes and logged in users
First step in alert triageVerify that the alert is not a false positive
First step in evidence preservationIsolate affected systems to prevent further contamination
How does threat intelligence helpProvide reputation and context to prioritize response
How to combat alert fatiguePrioritize tune and automate low value alerts
How to detect lateral movementMonitor for unusual authentication logons and remote execution
How to reduce false positivesRefine rules tune thresholds add context and suppression
Key chain of custody elements Who What When Why and HowRecord who collected handled and accessed evidence with timestamps and reasons
Key triage question Is this active or historical?Determine if attack is ongoing or already occurred
Order of volatile data collectionCollect RAM then network then disk then system logs
Post incident tasksRoot cause analysis lessons learned update playbooks
Primary purpose of a SIEMCollect correlate and alert on log data
Recovery stepsValidate systems monitor for recurrence restore services from clean backups
Risk of live forensicsAltering system state while collecting data
What does SIEM stand for?Security Information and Event Management
What hashing is used for evidence integrityUse cryptographic hashes like SHA256
What is a baselining in monitoringEstablishing normal behavior to detect anomalies
What is a containment validation testAttempting controlled access to ensure compromise is contained
What is a disk imageBit for bit copy of storage media for analysis
What is a learnings registerDocument of lessons countermeasures and action items from incidents
What is a playbook in incident responsePredefined procedures to handle specific incident types
What is alert enrichmentAdding context such as asset owner geolocation threat intelligence
What is alert fatigueDesensitization from too many alerts leading to missed critical events
What is alert severity ratingMeasure of impact and urgency of an alert
What is an event vs an alertEvent is raw logged activity Alert is SIEM flagged item
What is an incident timelineChronological record of events and actions during an incident
What is artifact preservationSaving files logs and config relevant to investigation
What is business impact analysis in incidentsAssessing effects on operations revenue and reputation
What is chain of custodyDocumented history of evidence handling
What is containment in incident responseActions to limit scope and impact of an incident
What is containment strategy short term vs long termShort term limits damage Long term removes persistent threats
What is data exfiltration indicatorLarge transfers unusual protocols or unknown destinations
What is endpoint detection and response EDRTooling for detecting investigating and responding on endpoints
What is eradicationRemoving root cause and malicious artifacts
What is escalation pathDefined route for raising incidents to higher expertise or authority
What is evidence admissibility considerationEnsure integrity provenance and authorized collection
What is evidence preservationActions to protect data integrity for investigations
What is false positiveAlert that is benign or expected behavior
What is forensic image verificationCompare hash of original and image to confirm exact copy
What is isolation vs quarantineIsolation removes system from network Quarantine limits harmful interactions while preserving data
What is key objective of eradication verificationEnsure no residual backdoors or artifacts remain
What is live forensicsCollecting data from a running system
What is log correlationLinking related log entries across sources to reveal incidents
What is log normalizationConverting diverse log formats into a consistent schema
What is log retention policyRules for how long different logs are stored
What is malware persistence indicatorRegistry autorun services scheduled tasks or startup entries
What is memory analysis used forRecovering malware and in memory artifacts
What is post incident activityReviewing and improving after containment and recovery
What is recoveryRestoring systems to normal operation securely
What is root cause analysis goalIdentify underlying cause to prevent recurrence
What is secure evidence storageProtecting evidence with access controls encryption and logging
What is SIEM use case for complianceCentralized logging retention access for audits
What is syslogStandard protocol for forwarding log messages
What is the IOC abbreviation forIndicator of Compromise
What is time synchronization importanceAligning timestamps across systems for accurate timelines
What is triage ticketing metadataDetails like priority owner status and notes for an alert
What is volatile dataInformation lost when a system is powered off
What to include in an incident reportExecutive summary timeline impact remediation and recommendations
Where to collect logs centrallySIEM or log aggregator
Why build a timelineUnderstand progression identify gaps and support reporting
Why create a disk imagePreserve original evidence while enabling analysis on a copy
Why document all actions during incidentProvide accountability enable reconstruction and legal defensibility
Why document escalation contactsEnsure timely access to decision makers and specialists
Why hash evidenceTo prove evidence has not been altered
Why index logs in a SIEMEnable fast search and correlation
Why retain logs for investigationsPreserve evidence and establish timelines
Why use log parsingExtract fields to enable search filtering and correlation

About the Flashcards

Flashcards for the Cisco CCNA Cybersecurity exam help students review core terminology, SIEM fundamentals, and practical incident response steps. The deck explains SIEM functions like log collection, normalization, indexing, common transports (UDP/TCP/TLS), and log parsing to enable correlation, enrichment, and threat intelligence driven prioritization. It also covers alert concepts such as event vs alert distinctions, severity levels, and strategies to reduce false positives.

It focuses on triage and forensic procedures: alert triage, IOC identification, volatile data collection order, disk imaging, hashing for integrity (SHA256), chain of custody, and evidence preservation. Students will reinforce operational steps for containment, eradication, recovery, and validation tests, plus building incident timelines, running root cause analysis, and documenting lessons learned and reports for stakeholders.

Topics covered in this flashcard deck:

  • SIEM and log management
  • Alert triage and correlation
  • Evidence preservation and hashing
  • Memory and disk forensics
  • Containment, eradication, recovery
  • Playbooks and incident reporting
Share on...
Follow us on...