4 - Information Security Incident Management Flashcards

1
Q

Who developed the Kill Chain and what are the phases

A

Lockheed Martin
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command & Control
Actions on Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which NIST Pub is for the Computer Security Incident Handling Guide

A

NIST 800-61

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of analysis should be performed prior to building our BCP or DR Plans

A

Business Impact Analysis (BIA) and
Criticality Analysis (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List some examples of backup media rotation

A

FIFO
Grandfather-father-son using full and daily incremental or differential.
Tower of Hanoi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between Incident Response testing and DR Testing

A

IRP - Doc Review, Walk through, and simulation

BCP/DR has parallel and cutover as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main purpose of the “chain of custody” procedures

A

To prove the integrity of investigation data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T or F documenting steps during actual security incidents will also determine whether the organization recovered from the incident

A

False
That is not the purpose of documenting and does not indicate if they actually recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary purpose of incident responders being asked to review incident response procedures.

A

Helps find mistakes in incident response procedures before an actual incident occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What PCI-DSS requirement is to put contact information for card brands in their incident response plans

A

12.10.1

card brands should notified as soon as possible after a knowledge of a breach of credit card data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the last step in a security incident

A

Post-Incident review or postmortem

Closure is second to last step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a good indicator on when Exec Management should be notified of a security incident

A

When regulators need to be notified

disruption in business

compromise of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purpose of a write blocker in the context of a security incident response

A

allows you to connect to hard drive that is the subject of a forensic analysis to a computer. The write block permits the computer to read from the subject hard drive but not permit any updates to the hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

for GDPR how quickly must an organization report a security breach of PII to SA

A

72 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What technology besides DLP will detect data exfiltration

A

Network anomaly detection since it is designed to baseline normal network behavior and report on a anomalous network traffic such as data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What plan is to ensure effective notifications of internal and external parties

A

Crisis Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is it feasible to during a known compromise to test the proposed changes in a test environment first

A

Yes if they want to minimize any disruption to the environment.

17
Q

What are some well known computer forensic tools

A

EnCase
Forensic Toolkit
Autopsy

18
Q

T or F that during a security incident during containment and remediation if your if your change control process is mature you can use that process

A

T
Test environments take more time and might not be available.

19
Q

Who is more appropriate to be on a CERT - IT Security Engineers or IT Network, System and application engineers

A

IT Network, system and application engineers are more familiar with the operational details and would be a better fit for this role

20
Q

Can there be more than one incident commander especially for a lengthy cybersecurity incident and if so, who should take that role

A

Yes. It is not feasible for one person to say work 24 or 48 hours straight and they should utilize member from the incident response team.

21
Q

What is the process of asking and analyzing until no more information is available

A

Root Cause Analysis

22
Q
A