9 - 1: Incident Response Programs Flashcards

1
Q

NIST Special Publication 800-61

A

Standard incident handling process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident Response Plan

A

Structure and guidance for responding to incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incident Response Plan elements

A

1) Statement of purpose/scope 2) clear strategies and goals 3) Approach to responses 4) Approval from Sr management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Service providers

A

Round out areas where services within the organization are needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Communication plan

A

Ensure the right people are informed of and during a cybersecurity incident. Who AND how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Involving law enforcement

A

Complex question as it may make some details public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident communications

A

Make sure they’re confidential and don’t risk alerting attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SIEM

A

Security Incident and Event Manager, coordinates information from a variety of sources - firewalls, IDS/IPS, event logs - to collect and analyze data for activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incidents may also be reported from ____ sources

A

External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident first response

A

Isolate the system, allow it to continue to run, but do not keep it connected to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident first response priority

A

Contain damage through isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Counterintelligence

A

As adversaries are trying to learn about your network, some organizations have programs to hinder or provide false information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Escalation and notification objectives

A

1) Evaluate severity 2) Escalate appropriately 3) Notify stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Low-impact events

A

Usually would not involve an after-hours response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Medium-impact events

A

Likely to have a security impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

High-impact events

A

May risk organizational security

17
Q

NIST containment criteria

A

1) Potential for damage and theft 2) Evidence preservation 3) Service availability 4) Resource requirements 5) Expected effectiveness 6) Solution time frame

18
Q

Mitigation ends with:

A

stability

19
Q

3 stages of containment

A

segmentation, isolation, removal

20
Q

Segmentation

A

Logically separating compromised systems using VLANs

21
Q

Isolation

A

Separating a breached system from others

22
Q

Removal

A

Detaching breached systems from the entire platform

23
Q

Eradication

A

Removes traces of an incident

24
Q

Recovery

A

Return to normal operations

25
Q

Validation

A

Checking the system has returned to its pre-compromise/breach state

26
Q

Post-incident response steps

A

1) Lessons learned 2) Evidence retention 3) Generation of indicators of compromise

27
Q

Who are best for lessons learned sessions?

A

Independent facilitators

28
Q

Configuration manager

A

Assists with automated system validation