5A Flashcards

1
Q

The incident response policy is designed for the ____ team that will be handling security incidents.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The incident response policy specifies what each person on the incident response team is responsible for and how to handle…?

A

security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reporting accurate incident information as close to ____ as possible is crucial to an effective response.

A

near-real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The first thing to do to prepare for handling security incidents within your organization is to make sure that you have an incident response team in place also known as?

A

CIRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does CIRT stand for?

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An incident response team is responsible for knowing how to handle security incidents that occur within the organization, and for ___ and ____ the security issues in a timely manner.

A

correcting and documenting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The first step in making an Incident Response Team is to create the ___. The team will be made up of different types of employees
within the organization with different skill sets.

A

team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List members that will typically appear on a response team.

A
  1. Team Leader
  2. Technical Specialist
  3. Documentation Specialist
  4. Legal Advisor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The following describes which member of the incident response team?

The ___ ___ is responsible for ensuring that all team members know their role when a security incident occurs. The ___ ___ is also responsible for building relationships with outside resources that may be called upon in special circumstances.

A

Team Leader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The following describes which member of the incident response team?

The ___ ___ has the technical expertise to assess the situation, identify the scale of the security incident, and the know-how to correct the situation. The CIRT may have several ___ ___ who specialize in different areas. For example, you may have a Windows Server specialist, a Linux specialist, and a Cisco specialist.

A

Technical Specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The following describes which member of the incident response team?

The ___ ___ knows how to document the entire response process, and the specialist is the person responsible for logging each incident in a documentation database, including the cause of the problem, and what the solution is.

A

Documentation Specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The following describes which member of the incident response team?

The ___ ___ knows the laws and regulations that your organization must follow when it comes to computer forensics and incident response. The legal advisor is someone the rest of the team can turn to if they have questions about legal issues.

A

Legal Advisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The following are common elements to include in the incident response plan:

A
  1. Incident Categories
  2. Roles and Categories
  3. Reporting Requirements/Escalation
  4. Exercise Planning
  5. User Roles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The following describes which general incident response plan?

The plan should define the different types of security incidents that can occur within your organization. For example, you may have an incident type called, “social engineering attack,” and another one called, “denial of service attack.”

A

Incident Categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The following describes which general incident response plan?

The plan should define each team member’s roles and responsibilities. This includes each member’s job role before a security incident occurs, during, and after a security incident.

A

Roles and Categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The following describes which general incident response plan?

The plan should identify when and how users are supposed to report potential security incidents. The incident response plan should also identify who the first responder is to escalate the incident to. Finally, the plan should identify any reporting requirements for the security incident, and what elements should be contained in the report.

A

Reporting Requirements/Escalation

17
Q

The following describes which general incident response plan?

It is important to ensure that everyone is prepared for the day a security incident occurs, so be sure to plan exercises where you can practice the events that may occur during a security incident from
the identification phase through to the lesson learned.

A

Exercise Planning

18
Q

The following describes which general incident response plan?

The first responder is the first individual to be notified of the incident and takes charge of the incident. The first responder is a member of the incident response team

A

User roles

19
Q

Upon detection of a possible event by internal or external sources, the appropriate operations center (OC) and Air Force Cyberspace Defense (ACD) units will initiate notification procedures in accordance with _____, Chairman of the Joint Chiefs of Staff (CJCSM) 6510.01B and established SOPs of the affected units.

A

AFI 10-206

20
Q

In cases when the cause/intent of a possible event is not readily apparent, it’s necessary to initially categorize detected activity as a category (CAT) __ investigation.

A

category 8 - Investigating.

21
Q

Information typically requested during an investigation
includes…?

A

1.Data detailing the source of the incident
2. The systems affected by the activity
3. Anti-virus and system log data
4. IDS and IPS logs
5. initial forensics data obtained either remotely or locally by using appropriate forensics tools as directed.
6. The ACD unit may also request the victim’s hard drive for an in-depth forensic analysis.

22
Q

Next, it must be determined whether a detected event is a reportable ___ or ___.

A

event or incident

23
Q

An ____ is any observable occurrence in a system and/or network. ____ sometimes provide indication that an incident is occurring

A

event

24
Q

An ____ is an assessed occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system; or the information the system processes, stores,
or transmits; or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies

A

incident

25
Q

When investigating a possible event/incident, it will be given a ___ ___ identifying it for descriptive purposes and level of severity of potential impact to mission. Reaction to different categories
will be different.

A

category number

26
Q

What is a category 0? (event)

A

Training and Exercises

27
Q

What is a category 1? (incident)

A

Root-Level Intrusion. Includes unauthorized access to information or account credentials that could be used to perform administrative functions. If the Information System (IS) is compromised with malicious code that provides remote interactive control, it will be reported in this CAT.

28
Q

What is a category 2? (incident)

A

User-Level Intrusion. Unauthorized non- privileged access to an IS. This includes unauthorized access to information or account credentials that could be used to perform user functions such as accessing Web applications, portals, or other similar information resources. If the IS is compromised with malicious code that provides
remote interactive control, it will be reported in this CAT.

29
Q

What is a category 3? (event)

A

Unsuccessful Activity Attempt. Deliberate attempts to gain unauthorized access to an IS that are defeated by normal defensive mechanisms. Attacker fails to gain access to the IS (i.e., attacker attempts valid or potentially valid username and password combinations) and the activity cannot be characterized as exploratory
scanning.

30
Q

What is a category 4? (incident)

A

Denial of Service. Activity that denies, degrades, or disrupts normal functionality of an IS or DoD information network.

31
Q

What is a category 5? (event)

A

Non-Compliance Activity. Activity that potentially exposes ISs or networks to increased risk because of the action or inaction of authorized users. This includes administrative and user actions such as failure to apply security patches, connections across security domains, installation of vulnerable applications, and other breaches
of existing AF or DoD policy.

32
Q

What is a category 6? (event)

A

Reconnaissance. Activity that seeks to gather information used to characterize ISs, applications, DoD information networks, and users that may be useful in formulating an attack. This includes activity such as mapping DoD information networks, IS devices and applications, interconnectivity, and their users or reporting structure.
This activity does not directly result in a compromise.

33
Q

What is a category 7? (incident)

A

Malicious Logic. Installation of software designed and/or deployed by adversaries with malicious intentions for the purpose of gaining access to resources or information without the consent or knowledge of the user. This only includes malicious code that does not provide remote interactive control of the compromised IS. Malicious code that has allowed interactive access should be categorized as CAT 1 or CAT 2 incidents, not CAT 7.

34
Q

What is a category 8? (event)

A

Investigating. Events that are potentially malicious or anomalous activity deemed suspicious and warrant, or are undergoing, further review. No event will be closed out as a CAT 8 but will be re-categorized prior to closure.

35
Q

What is a category 9? (event)

A

Explained Anomaly. Suspicious events that, after further investigation, are determined to be non-malicious activity and do not fit the criteria for any other categories. This includes events such as system malfunctions and false alarms. When reporting these events, clearly specify the reason for which it cannot be otherwise categorized.