4.0 Respond Flashcards

1
Q

Incident response plans and processes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Communication with internal and external stakeholders

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Personnel role and responsibilities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Incident reporting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allow list/block list

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS/IPS rules configuration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network segmentation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web content filtering

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port blocking

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS/IPS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web proxy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anti-malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Endpoint security solutions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DLP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Windows tools to analyze incidents

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Registry

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

File system

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Processes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Services

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Volatile memory

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Active Directory tools

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Linux- based tools to analyze incidents

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Network

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

File system

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Processes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Volatile memory

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Session management

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Digital evidence collection

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Physical evidence collection

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Chain of custody

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Static analysis

36
Q

Dynamic analysis

38
Q

EnCase

39
Q

eDiscovery

40
Q

Forensic Explorer

41
Q

Kali Linux Forensic Mode

42
Q

CAINE

43
Q

SANS SIFT

44
Q

Volatility

45
Q

Binalyze AIR

46
Q

Forensically sound duplicates

47
Q

Document and communicate results

49
Q

Data analysis

50
Q

Intrusion prevention or detection systems (IDS/IPS)

51
Q

Forensic Analysis

52
Q

Correlation Analysis

53
Q

Event correlation tools and techniques

54
Q

Root cause analysis

55
Q

Alerting systems

56
Q

Incident reports

57
Q

Document and communicate results

58
Q

Chain of command

59
Q

Policies

60
Q

Procedures

61
Q

Incident response plan

62
Q

Security configuration controls

63
Q

Baseline configurations

64
Q

Hardening documentation

65
Q

Document measures implemented

66
Q

Threat actors

67
Q

Patterns of activity

68
Q

Methods

69
Q

Tactics

70
Q

Early stages of campaign

71
Q

Key facts of the infrastructure

72
Q

Artifacts and tools used

73
Q

Techniques

74
Q

Technological

75
Q

Non-technological

76
Q

Procedures

77
Q

Communication policies and procedures

78
Q

Internal communication methods

79
Q

Secure channels

80
Q

Out-of-band communications

81
Q

Local law enforcement

82
Q

Stockholders

83
Q

Breach victims

84
Q

Media

85
Q

Other CERTS/CSIRTS

86
Q

Vendors