3.0 Cyber Incident Response Flashcards
what does the acronym MTD denote?
maximum tolerable downtime
what is MTBF?
the estimated amount of time a device will operate before a failure occurs
what are the four types of personally identifiable information (PII)?
personal characteristics - such as full name, DoB, height, ethnicity, place of birth, mother’s maiden name, and biometric characteristicsa unique set of numbers assigned to an individual - such as government ID number, telephone number, driver’s license number, and PINdescriptions of events or points in time - such as arrest records, employment records, and medical recordsdescription of locations or places - such as GPS tracking information
what does the acronym RTO denote?
recovery time objective
what does the acronym MTBF denote?
mean time between failures
what does the acronym RPO denote?
recovery point objective
which two factors should contribute to incident severity and prioritization?
impact scope and the type of data affected
which attack is one discovered in live environments for which no current fix or patch exists?
zero-day attack
what is RTO?
the shortest time period after a disaster or disruptive event within which a resource or function must be restored to avoid unacceptable consequences
which impact scope factor refers to the amount of data corrupted or altered during the incident?
data integrity
what does the acronym PHI denote?
personal health information
what is meant by economic factor of an incident?
the cost of the incident to the organization
which impact scope factor refers to the amount of time taken to recover from the incident?
recovery time
which attack type targets a specific entity and is carried out over a long period of time?
advanced persistent threat (APT)
which impact scope factor refers to the amount of time access to resource were interrupted?
downtime
what is MTD?
the maximum amount of time that an organization can tolerate a single resource or function being down
what does the acronym PII denote?
personally identifiable information
what is RPO?
the point in time to which the disrupted resource or function must be returned
what is the best method to preserve evidence on a computer: bit stream backup or standard backup?
bit stream backup
what is the order of volatility from most volatile to least volatile?
registers, cacheswap spacerouting table, ARP cache, process table, kernel statistics, and memorytemporary file systemsdiskremote logging and monitoring data that is relevant to the system in question
what are the FOUR documents/forms that should be part of forensic kit?
chain of custody form, incident response plan, incident form, call list/escalation list
what is a write blocker?
a tool that permits read-only access to data storage devices without compromising the integrity of the data
what is the purpose of imaging utilities included in a forensic kit?
to create a bit-level copy of drives
what are the NINE components that should be included in a forensic kit?
- digital forensics workstation2. write blockers3. cables4. drive adaptors5. wiped removable media6. camera7. crime tape8. tamper-proof seals9. documentation/forms
what is the purpose of the chain of custody form?
it will indicate who has handled the evidence, when they handled it, and the order in which the handler was in possession of the evidence
which condition must be true of the hash values of a file to prove the file is unaltered?
the hash values must remain the same
what is a SCADA device?
a system operating with coded signals over communication channels that provides control of remote equipment
what is the purpose of tamper-proof seals?
to ensure that the chain of custody is maintained
what is the purpose of hashing utilities included in a forensic kit?
to create a hash value of files so that you can prove that certain evidence has not been altered during your possession of the evidence