14 Monitoring and incident response Flashcards

1
Q

What are the phases of the incident response cycle in the Security+ exam?

A

Preparation, detection, analysis, containment, eradication, recovery, and lessons learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: The incident response process can only move forward through its phases.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of exercises do organizations use to train their staff for incident response?

A

Tabletop exercises, walk-throughs, and simulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of threat hunting?

A

To identify potential indicators of compromise using data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are IoCs in the context of threat hunting?

A

Indicators of compromise, which include various signs of potential security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List some examples of IoCs.

A
  • Account lockout
  • Concurrent session usage
  • Impossible travel
  • Attempted access to blocked content
  • Resource consumption
  • Resource inaccessibility
  • Out-of-cycle logging
  • Missing logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What tools are commonly used for data management in incident response?

A

Security Information and Event Management (SIEM) tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of information do SIEM tools gather and analyze?

A
  • Vulnerability scan output
  • System configuration data
  • System and device logs
  • Network traffic information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is network traffic information collected?

A

Using NetFlow, sFlow, and packet analyzers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of collecting network traffic information?

A

To provide details about bandwidth usage and system communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some common mitigation techniques used by incident responders?

A
  • Changing configurations for endpoint security solutions
  • Using allow/block lists
  • Quarantining files or devices
  • Making firewall changes
  • Using MDM or DLP tools
  • Adding content or URL filtering rules
  • Revoking or updating certificates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does root cause analysis help to determine?

A

Why an incident was able to happen and to guide preparation work to avoid future incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: Incident responders use _______ to ensure that the impact of incidents are limited.

A

[mitigation techniques]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly