4.8 Flashcards

Incident response, incident planning, digital forensics, log data

1
Q

What is the NIST code for the Computer Security Incident Handling Guide?

Includes the whole of the incident response lifecycle:
Preparation
Detection and analysis
Containment, eradication, and recovery
Post-incident activity

A

NIST SP800-61

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 phases of incident response

A

Preparation
Detection and analysis
Containment, eradication, and recovery
Post-incident activity (lessons learned)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 steps for the Preparation phase of incident response

A

Communication methods (phones, contact info)

Incident handling hardware/software (laptops, removable media, forensic software, digital cameras, etc.)

Incident analysis resources (documentation, network diagrams, baselines, critical hash values)

Incident mitigation software (clean OS and app images)

Incident handling policies (so everyone knows what to do)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why can isolating malware be potentially problematic?

A

The malware can recognize that it’s running inside a VM/sandbox, and delete itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The method of determining the ultimate cause of an incident

A

Root cause analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True/False

There can be more than one single root cause of a security incident

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of actively searching for vulnerabilities to correct. This includes vulnerability scanning, installing patches, and monitoring threat/vulnerability sharing networks.

A

Threat hunting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A data acquisition request, normally given by lawyers, to preserve relevant information for litigation.

A

Legal hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When legal counsel requests a legal hold for some data, where is that data held?

A

In a separate repository for ESI (electronically stored information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A list of everyone who contacts the evidence, handles the evidence, where it was stored, etc

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The fancy word for obtaining data evidence

A

Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When acquiring data evidence of virtual systems, you can obtain a ____

A

Snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Some of the most interesting data evidence comes from ____ (5)

A

Artifacts,
recycle bins,
log information,
browser bookmarks,
saved logins,
etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A documentation of how data evidence was acquired (including the incident) and stored, as well as the findings of the analysis and a conclusion with professional results.

A

Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The method of isolating and protecting the data evidence

May include making copies for analysis to prevent making changes to the original data

A

Preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The process of collecting, preparing, reviewing, interpreting, and producing electronic documents

This does NOT generally involve analysis; it mainly focuses on acquisition. You might produce documents to a forensics team or other professional, though, for them to analyze.

A

E-discovery

17
Q

A SIEM feature (or a service by a third-party service) that automatically generates screens of aggregated data for comparison and correlations.

A

Automated reports

18
Q

A summary of SIEM information that produces a customized screen of important information for quick review.

Does not show long-term information; it’s mostly for giving the viewer an understanding of the current status of the network and devices.

A

Dashboard