210-255 Flashcards
What is accomplished in the identification phase of incident handling?
Determining that a security event has occurred
Which two HTTP header fields relate to intrusion analysis? (Choose two)
User-agent
Host
Which component of the NIST SP800-61 r2 incident handling strategy reviews data?
Post-incident analysis
Which option is generated when a file is run through an algorithm and generates a string specific to the contents of that file?
Hash
Which data type is protected under the PCI compliance framework?
Primary account number
Which CVSSv3 metric captures the level of access that is required for a successful attack?
Privileges required
From a security perspective, why is it important to employ a clock synchronization protocol on a network?
To construct an accurate timeline of events when responding to an incident.
You see 100 HTTP GET and POST requests for various pages on one of your web servers. The user agent in the requests contain php code that, if executed, creates and writes to a new php file on the webserver. Which category does this even fall under as defined in the Diamond Model of Intrustion?
Delivery
Which option is misuse variety per VERIS enumerations?
Hacking
Which stakeholder group is responsible for containment, eradication, and recovery in incident handling?
Leaders and Managers
A user on your network receives an email in their mailbox that contains a malicious attachment. There is no indication that the file was run. Which category as defined in the kill-chain model does this activity fall under?
Delivery
During which phase of the forensic process are tools and techniques used to extract the relevant information from the collective data?
Examination
Which option allows a file to be extracted from a TCP steam within Wireshark?
File > Export Objects
Which element can be used by a threat actor to discover a possible opening into a target network and can also be used by an analyst to determine the protocol of the malicious traffic?
Ports
In Microsoft Windows, as files are deleted the space they were allocated eventIally is considered available for use by other files. This creates alternating used and unused areas of various sizes. What is this called?
Free space fragmentation
In the context of incident handling phases, which two activities fall under scoping?
Identifying the extent that a security incident is impacting protected resources on the network.
Identifying the attackers that are associated with a security incident.
Which regular expression matches “color” and “colour”?
colou?r
Which description of a retrospective malware detection is true?
You can use historical information from one or more sources to identify the affected host or file.
Which process is being utilized when IPS events are removed to improve data integrity?
Data normalization
Which element is included in an incident response plan?
Organization mission
Which CVSSv3 metric value increases when attacks consume network bandwidth, processor cycles, or disk space?
Availability
Which Security Operations Center’s goal is to provide incident handling to a country?
National CSIRT
A CMS plugin creates two files that are accessible from the Internet myplugin.html and exploitable.php. A newly discovered exploit takes advantage of an injection vulnerability in exploitable.php. To exploit the vulnerability, one must send an HTTP POST with specific variables to exploitable.php. You see traffic to your webserver that consists of only HTTP Get requests to myplugin.html. Which category best describes this activitiy?
Reconnaissance
Which goal of data normalization is true?
Reduce data redundancy
Which identifies both the source and destination location?
IP address
Which type of analysis assigns values to scenarios to see what the outcome might be in each scenario?
Deterministic
Which feature is used to find possible vulnerable services running on a server?
Listening ports
Which two options can be used by a threat actor to determine the role of a server? (Choose two)
Running processes
Applications
Which option creates a display filter on Wireshark on a host IP address or name?
ip.addr==or ip.host ==
You receive an alert for malicious code that exploits Internet Explorer and runs arbitrary code on the site visitor machine. The malicious code is on an external site that is being visited by hosts on your network. Which user agent in the HTTP headers in the requests from your internal hosts warrants further investigation?
Mozilla/5.0 (compatible, MSIE 10.0, Windows NT 6.2, Trident 6.0)
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?
Collection
Which information must be left out of a final incident reports?
Server hardware configurations