3.4 Cyber Incident Response Flashcards

1
Q

what is data exfiltration?

A

the unauthorized copying, transfer or retrieval of data from a computer or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what should you do if you discover rogue devices on the network?

A

locate and remove them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what happens in vertical privilege escalation?

A

the attacker obtains higher privileges by performing operations that allow the attacker to run unauthorized code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the SIX network-related symptoms of incidents?

A

bandwidth consumption

beaconing

irregular peer-to-peer communication

rogue devices on the network

scan sweeps

unusual traffic spikes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is meant by anomalous activity?

A

activity that is outside the norms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when does an escalation of privileges attack occur?

A

when an attacker has used a design flaw in an application to obtain unauthorized access to the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are scan sweeps?

A

an attempt by an unauthorized entity to map your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what happens in horizontal privilege escalation?

A

the attacker obtains the same level of permissions as he already has but uses a different user account to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the eight host-related symptoms of an incident?

A

processor consumption

memory consumption

drive capacity consumption

unauthorized software

malicious processes

unauthorized changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is beaconing?

A

when malware attempts to remotely connect to a command and control host or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the SIX application-related symptoms of incidents?

A

anomalous activity

introduction of new accounts

unexpected output

unexpected outbound communication

service interruption

memory overflows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly