Skip to main content

Incident Response Quiz

Last Updated: 2025-02-17 Status: Complete

Test your understanding of incident response with these self-assessment questions.

Incident Classification

Question 1: Incident vs. Breach

What is the difference between a security incident and a confirmed breach?

View Answer

Security Incident:

  • Any event that potentially compromises security
  • May or may not involve data access
  • Requires investigation to determine scope
  • Examples: malware detection, unauthorized access attempt, policy violation

Confirmed Breach:

  • Unauthorized access to sensitive data is confirmed
  • Data has been or likely was accessed or exfiltrated
  • Triggers notification requirements
  • Examples: database with PANs accessed, cardholder data exported

Key Distinction:

FactorIncidentBreach
Data accessedUnknown/NoConfirmed Yes
Notification requiredNot automaticallyYes, per laws
Forensics requiredMaybeUsually yes
Regulatory reportingDependsRequired

Why It Matters:

  • Not every incident is a breach
  • Breach triggers specific legal obligations
  • Must investigate to determine which
  • Document decision either way

Question 2: Immediate Steps

A potential data breach is detected. What are the immediate steps that must be taken?

View Answer

Immediate Steps (First 60 Minutes):

StepActionOwner
1Alert incident response teamFirst responder
2Activate incident commanderOn-call lead
3Preserve evidenceSecurity team
4Initial assessmentSecurity team
5Classify severityIncident commander
6Begin containment if criticalSecurity team
7Notify legal counselIncident commander
8Start incident logAll

Containment Actions:

  • Isolate affected systems
  • Disable compromised accounts
  • Block malicious IPs/access
  • Preserve logs before rotation

Do NOT:

  • Reboot systems (destroys memory evidence)
  • Delete logs or files
  • Notify customers yet (investigation first)
  • Make public statements
  • Speculate about scope

Who to Notify Immediately:

  • Acquiring bank
  • Legal counsel
  • Executive sponsor (if critical)

Question 3: Notification Timelines

What are the notification timelines for a confirmed breach? Who must be notified?

View Answer

Notification Timeline:

RecipientTimelinePurpose
Acquiring bankImmediately (hours)Required by agreement
Card networksImmediately (hours)Account data compromise
Legal counselImmediatelyGuidance on obligations
Executive teamSame dayDecision authority
State AG (varies)15-60 daysRegulatory requirement
Affected customers30-60 daysPer state law
Credit bureausWith customer noticeIf > 5,000 affected

Card Network Specifics:

NetworkKey Requirements
Visa24 hours, contain within 60 business days
MastercardImmediately, provide account list ASAP

State Law Examples:

StateTimelineNotes
California30 days (residents), 15 days (AG)SB 446 effective 2026
Oklahoma60 daysExpanded data types
Most states"Without unreasonable delay"Often interpreted as 30-60 days

GDPR (if applicable):

  • 72 hours to supervisory authority
  • "Without undue delay" to individuals

Scenario Questions

Question 4: Accidental Data Exposure

Scenario: A developer accidentally logs cardholder data to application logs. The logs are stored in a cloud service. Is this a breach? What steps must be taken?

View Answer

Assessment:

Is this a breach?

  • Potentially yes - depends on who had access to logs
  • Cardholder data was stored inappropriately (PCI violation)
  • If logs were accessible beyond authorized personnel, it's a breach

Investigation Questions:

  1. What data was logged? (Full PAN, partial, other?)
  2. How long were logs retained?
  3. Who had access to log storage?
  4. Is log storage encrypted?
  5. Are there access logs for the log storage?
  6. Any evidence of unauthorized access?

Required Steps:

Immediate (Hours):

  1. Stop logging sensitive data
  2. Preserve existing logs as evidence
  3. Assess who had access
  4. Notify legal counsel
  5. Document the incident

Short-Term (Days):

  1. Determine if unauthorized access occurred
  2. If breach confirmed, notify acquiring bank
  3. Engage forensics if needed
  4. Prepare notification materials

Remediation:

  1. Implement log masking/filtering
  2. Review all logging for PCI data
  3. Train developers on data handling
  4. Update secure coding standards

PCI Implications:

  • Storing PAN in logs violates Requirement 3
  • May trigger non-compliance notification
  • Document remediation for next assessment

Question 5: Incident Response Team Structure

How should an incident response team be structured for a payment facilitator?

View Answer

Recommended Team Structure:

Role Responsibilities:

RolePrimary Responsibilities
Incident CommanderOverall coordination, escalation decisions, resource allocation
Security LeadTechnical investigation, containment, evidence preservation
IT OperationsSystem access, log retrieval, remediation execution
Legal CounselNotification requirements, liability assessment, regulatory guidance
CommunicationsInternal/external messaging, customer notification drafting
Compliance OfficerRegulatory reporting, card network notifications
Executive SponsorResource authorization, board communication

PayFac-Specific Additions:

RoleResponsibility
Merchant OperationsSub-merchant communication and support
Sponsor Bank LiaisonCoordinate with acquiring bank
Risk TeamAssess merchant portfolio impact

Team Activation Criteria:

SeverityTeam Activated
CriticalFull team + external
HighCore team + legal
MediumSecurity + IT + on-call
LowSecurity lead only

24/7 Availability:

  • On-call rotation for core team
  • Contact list maintained and tested
  • Escalation procedures documented

Question 6: Post-Breach Actions

After a breach is contained and notifications sent, what ongoing actions are required?

View Answer

Post-Breach Actions:

Immediate Post-Containment:

ActionTimelineOwner
Complete forensic report2-4 weeksForensics team
Document lessons learned1 week post-closeIR team
Update incident response plan2 weeksSecurity
Remediate vulnerabilitiesASAPIT/Security

Customer Support:

ActionDescription
Inquiry hotlineDedicated line for affected customers
FAQ documentCommon questions answered
Credit monitoringIf offered, manage enrollment
Follow-up communicationsUpdates as investigation concludes

Regulatory Follow-Up:

ActionTimeline
State AG follow-upAs required
Card network updatesAs requested
PCI assessor notificationAt next assessment
Insurance claimsPer policy

Technical Remediation:

ActionPurpose
Patch vulnerabilitiesPrevent recurrence
Enhance monitoringDetect similar attacks
Update access controlsLimit exposure
Security testingValidate fixes

Process Improvements:

ActionPurpose
Tabletop exerciseTest updated plan
Training refreshApply lessons learned
Control updatesBased on root cause
Policy updatesAddress gaps identified

Documentation to Retain:

DocumentRetention
Incident report7+ years
Forensic report7+ years
Notification copies7+ years
Remediation evidence5+ years

Summary

After completing this quiz, you should understand:

  • Difference between security incident and confirmed breach
  • Immediate steps upon detecting potential breach
  • Notification timelines for different parties
  • How to assess if an event constitutes a breach
  • Incident response team structure
  • Post-breach ongoing obligations
Share: