301-350 Flashcards
During which of the following phases of the Incident Response process should a security administrator define and implement general defense against malware?
B.
Preparation
Incident response procedures involve: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. It is important to stop malware before it ever gets hold of a system –thus, you should know which malware is out there and take defensive measures - this means preparation to guard against malware infection should be done.
The Chief Technical Officer (CTO) has tasked The Computer Emergency Response Team (CERT) to develop and update all Internal Operating Procedures and Standard Operating Procedures documentation in order to successfully respond to future incidents.
Which of the following stages of the Incident Handling process is the team working on?
D.
Preparation
Incident response procedures involve: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. Developing and updating all internal operating and standard operating procedures documentation to handle future incidents is preparation.
The helpdesk reports increased calls from clients reporting spikes in malware infections on their systems.
Which of the following phases of incident response is MOST appropriate as a FIRST response?
D.
Identification
To be able to respond to the incident of malware infection you need to know what type of malware was used since there are many types of malware around. This makes identification critical in this case.
Who should be contacted FIRST in the event of a security breach?
C.
Incident response team
A security breach is an incident and requires a response. The incident response team would be better equipped to deal with any incident insofar as all their procedures are concerned. Their procedures in addressing incidents are: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control.
In which of the following steps of incident response does a team analyze the incident and determine steps to prevent a future occurrence?
D.
Lessons learned
Incident response procedures involve in chronological order: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. Thus, lessons are only learned after the mitigation occurred. For only then can you ‘step back’ and analyze the incident to prevent the same occurrence in the future.
After a recent security breach, the network administrator has been tasked to update and backup all router and switch configurations. The security administrator has been tasked to enforce stricter security policies. All users were forced to undergo additional user awareness training.
All of these actions are due to which of the following types of risk mitigation strategies?
D.
Lessons learned
Incident response procedures involve: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. Described in the question is a situation where a security breach had occurred and its response which shows that lessons have been learned and used to put in place measures that will prevent any future security breaches of the same kind.
A server dedicated to the storage and processing of sensitive information was compromised with a rootkit and sensitive data was extracted.
Which of the following incident response procedures is best suited to restore the server?
A.
Wipe the storage, reinstall the OS from original media and restore the data from the last known good backup.
In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in question from the incident manager.
Which of the following incident response procedures would he need to perform in order to begin the analysis? (Choose two.)
A.
Take hashes
D.
Capture the system image
A: Take Hashes. NIST (the National Institute of Standards and Technology) maintains a National Software Reference Library (NSRL). One of the purposes of the NSRL is to collect “known, traceable software applications” through their hash values and store them in a Reference Data Set(RDS). The RDS can then be used by law enforcement, government agencies, and businesses to determine which files are important as evidence in criminal investigations.
D: A system image is a snapshot of what exists. Capturing an image of the operating system in its exploited state can be helpful in revisiting the issue after the fact to learn more about it.
Which of the following is the LEAST volatile when performing incident response procedures?
D.
Hard drive
An example of OOV in an investigation may be RAM, hard drive data, CDs/DVDs, and printouts. Of the options stated in the question the hard drive would be the least volatile.
The security officer is preparing a read-only USB stick with a document of important personal phone numbers, vendor contacts, an MD5 program, and other tools to provide to employees.
At which of the following points in an incident should the officer instruct employees to use this information?
B.
First Responder
Incident response procedures involve: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. In this scenario the security officer is carrying out an incident response measure that will address and be of benefit to those in the vanguard, i.e. the employees and they are the first responders.
After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak.
Which of the following would be MOST effective in reducing data leaks in this situation?
A.
Information Security Awareness
Education and training with regard to Information Security Awareness will reduce the risk of data leaks and as such forms an integral part of Security Awareness. By employing social engineering data can be leaked by employees and only when company users are made aware of the methods of social engineering via Information Security Awareness Training, you can reduce the risk of data leaks.
Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building.
Which of the following should Sara immediately implement?
D.
Security awareness training
Security awareness and training include explaining policies, procedures, and current threats to both users and management. A security awareness and training program can do much to assist in your efforts to improve and maintain security. A good security awareness training program for the entire organization should cover the following areas: Importance of security; Responsibilities of people in the organization; Policies and procedures; Usage policies; Account and password- selection criteria as well as Social engineering prevention.
Security awareness training
Human Resources (HR) would like executives to undergo only two specific security training programs a year.
Which of the following provides the BEST level of security training for the executives? (Choose two.)
D.
Phishing threats and attacks
F.
Information security awareness
The method to provide end users of IT systems and applications with requirements related to acceptable use, privacy, new threats and trends, and use of social networking is:
A.
Security awareness training.
Security awareness and training are critical to the success of a security effort. They include explaining policies, procedures, and current threats to both users and management.
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered connection and corporate data is stolen.
Which of the following would BEST prevent this from occurring again?
C.
Security policy and threat awareness training.
BYOD (In this case Sara’s smartphone) involves the possibility of a personal device that is infected with malware introducing that malware to the network and security awareness training will address the issue of the company’s security policy with regard to BYOD.
Which of the following is the BEST reason to provide user awareness and training programs for organizational staff?
B.
To reduce organizational IT risk
Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is worried about the confidentiality of the information.
Which of the following will accomplish this task securely?
D.
Encryption
Encryption is used to prevent unauthorized users from accessing data. Data encryption will support the confidentiality of the email.
Ann, a technician, received a spear-phishing email asking her to update her personal information by clicking the link within the body of the email.
Which of the following type of training would prevent Ann and other employees from becoming victims to such attacks?
C.
Personal Identifiable Information
Personally identifiable information (PII) is a catchall for any data that can be used to uniquely identify an individual. This data can be anything from the person’s name to a fingerprint (think biometrics), credit card number, or patient record. Employees should be made aware of this type of attack by means of training.
End-user awareness training for handling sensitive personally identifiable information would include secure storage and transmission of customer:
A.
Date of birth.
Which of the following concepts is a term that directly relates to customer privacy considerations?
B.
Personally identifiable information