15 D4 pt2 Flashcards

1
Q

Last step in Analyze phase is the ___; includes next actions necessary to respond.

A

Course of Action (COA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls:

___ - has 4 layers, provides additional security for servers.

A

Dual Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incident handling and Response:

__- detection, analysis, and response to any event or incident.

A

Incident Handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__ Attacks can be malicious or non-malicious.

A

Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Incident handling and Response:

__- compilation of incident or intrusion sets with similar characteristics..

A

Incident Sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Incident handling and Response:

__- occurrence having actual/potential adverse effects on an IS.

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A __ is a system or group of systems configured to enforce a security policy between 2 networks.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Incident handling and Response:

__- an occurrence, not yet assessed that may affect performance of an IS.

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Incident response categories:
Incidents:
\_\_ - root intrusion
\_\_ - user intrusion
\_\_ - DoS
\_\_ - Malicious logic
A

1 root intrusion
2 user intrusion
4 DoS
7 malicious logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Important principle of the Defense in Depth strategy is focused on these 3 elements:

A

People
Organizations
Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewalls:

___ - simple and low cost, if router compromised the entire network is compromised.

A

Simple Firewall with 1 Choke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For a firewall to be effective the following must be true:

  • All traffic must be __
  • Only __ __ is allowed to pass through
  • the __/__ is highly resistant to penetration
A
  • scanned
  • authorized traffic
  • system/host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewalls:

___ - has 3 layers, if firewall is compromised additional protection exists.

A

Belt and Suspenders Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall Types:

__ - checks packet header information, does not check packet contents.

A

Stateless packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__, __, and __ are 3 tools that can carve files from the network.

A

Tcpxtract
Xplico
NetworkMiner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall Types:

__ - uses a combination of the other firewall techniques.

17
Q

Firewalls:

___ - Multiple NICs with one firewall for centralized security policies.

A

Multi-homed Firewall

18
Q

A combination of the below concepts represent the defense in depth model:

  • __
  • __
  • __
  • __
A
  • deploy robust KMI/PKI
  • deploy IDS to detect, evaluate, examine, and act on intrusions
  • apply perimeter protection
  • apply internal protection
19
Q

Incident handling and Response:

__- unauthorized access to an IS.

20
Q

Firewalls:

___ - has 2 layer, if the firewall is compromised the entire network is compromised.

A

Classic Firewall Architecture

21
Q

__- The intent of the methodology is to help coordinate, de-conflict, and execute an incident response within minutes or hours as opposed to days or weeks.

A

Incident Handling Methodology

22
Q

Firewall Types:
__ - examines both incoming and outgoing packets and has the ability to inspect communication layers and extract relevant data.

A

Stateful packet filtering

23
Q
Benefits of an IDS/IPS:
\_\_     \_\_
\_\_     \_\_
\_\_     \_\_
\_\_     \_\_
\_\_     \_\_
\_\_
A

Passive - Requires no modifications - Analyzes data as collected or after - Real time alert notifications - Data gathering upon detection - Replay computer transmissions - Full suite of analytic tools - Can command line or gui - Interface for secure connections - User customizable

24
Q

Firewall Types:
__ - listens for service requests from internal clients and forwards those requests to the external network; operates in application layer

A

Application layer gateway/proxy

25
A __ is the technical and operational impact of the incident on the organization.
Battle Damage Assessment (BDA)
26
``` Incident response categories: Event: __ - unsuccessful access __ - non-compliance __ - reconnaissance __ - investigating __ - explained anomaly ```
``` 3 unsuccessful access 5 non-compliance 6 reconnaissance 8 investigating 9 explained anomaly ```
27
Incident and reportable event reporting follows 2 channels: __ Channel - assists with incident handling and providing fixes. __ Channel - designed to notify commanders.
Technical channel | Management channel
28
__ hide private clients, can block dangerous urls, filter dangerous content, check the consistency of returned content, and lag behind new services.
Proxies