Ch. 12 Disaster Recovery & Incident Response Flashcards

1
Q

Cold Site

A

A physical site that can be used if the main site is inaccessible but lacks the resources to enable an organization to use it immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Differential Backup

A

Backs up new files or files that have changed since the last full backup. They don’t clear the archive bit upon their completion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Failover

A

The process of reconstructing a system or switching over to other systems when a failure is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

False positive

A

A flagged event that isn’t really a notable incident and has been falsely triggered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hot site

A

A location that can provide operations within hours of a failure. AKA Active Backup Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Incremental Backup

A

Includes only new files or files that have changed since the last full backup and then clears the archive bit upon completion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intrusion

A

The act of entering a system without authorization to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IDS

A

Intrusion Detection System - Any set of tools that can identify an attack using defined rules or logic. Can be network based or host based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPS

A

Intrusion Prevention System - Any set of tools that identify and then actively respond to attacks based on defined rules. Like an IDS (which is passive) an IPS can be network-based or host-based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intrusive tests

A

Penetration-type testing that involves trying to break the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nonintrusive tests

A

Penetration/vulnerability testing that takes a passive approach rather than actually trying to break into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Snapshot

A

Image of a virtual machine at a moment in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System image

A

A snapshot of what exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tabletop Exercise

A

Involves individuals sitting around a table with a facilitator discussion situations that could arise and how best to respond to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability Scanning

A

Identifying specific vulnerabilities in your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Warm Site

A

A site that provides some capabilities in the event of a disaster. The organization will still need to install, configure, and reestablish operations on systems that might already exist int he warm site. AKA reciprocal site or active/active model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Working Copy Backup

A

Copy of data currently in use on a network. Also known as shadow copies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Passive Reconnaissance

A

Collecting data from public databases, talking to employees/partners, dumpster diving, social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Active Reconnaissance

A

Directly focuses on the systems and its weaknesses. I.e., port scans, traceroute info, network mapping, etc.

20
Q

Pivotting

A

AKA Island Hopping - a compromised system is used to attack another system on the same network.

21
Q

Three types of testing

A

Black Box, White Box, and Gray Box

22
Q

Black Box testing

A

No knowledge of the system, mimics and outside attacker

23
Q

White Box

A

Significant knowledge of the system, simulates an inside attack, rogue employee

24
Q

Gray Box

A

Limited knowledge of the system

25
Q

Business Continuity

A

Concerned with the policies, processes, and methods that an organization follows to minimize the impact of a system failure, network failure, or failure of any key component needed for operation. “Show must go on”

26
Q

Business Continuity Planning (BCP)

A

Process of implementing policies, controls, and procedures to counteract the effects of losses, outages, or failures of critical business processes.

27
Q

Two Key Components of BCP

A
  1. Business Impact Analysis (evaluates processes)

2. Risk Assessment (Evaluates risk and likelihood of loss)

28
Q

Critical Business Functions

A

Processes or systems that must be made operational immediately when an outage occurs.

29
Q

Journaled File System (JFS)

A

includes a log file of all changes and transactions that have occurred within a set a period of time. A system can check these log files to see which transactions have been committed and which ones have not.

30
Q

Journaling

A

Creates a JFS on the server

31
Q

Archive Bit

A

A flag associated with every file that is turned on when the file is created or accessed. Used during backups to determine if a file has changed.

32
Q

Incremental Backup

A

Only backups data that has been changed since the last full or incremental backup

33
Q

Differential Backup

A

Backups up data that has changed since the full backup.

34
Q

Hierarchical Storage Management (HSM)

A

Provides continuous online backup by using optical or tape jukeboxes. Data is continuously backed up and it shows as an infinite disk to the system.

35
Q

Hardware Security Module (HSM)

A

A method of transient cryptographic key exchange

36
Q

Grandfather, Father, Son Method

A

Full backups occur at regular intervals, the most recent backup after the full backup is the son. Annual backups are referred to as the grandfather, monthly are the father, and weekly the son. Weekly or daily incremental backups are done between full backups.

37
Q

Full Archival Method

A

All full backups, incremental backups, and any other backups are stored forever.

38
Q

Backup Server Method

A

A dedicated server is used for backups

39
Q

Three types of backup methods

A
  1. Grandfather, Father, Son method
  2. Full Archival Method
  3. Dedicated Backup Server
40
Q

Backout

A

A reversion from a change that had negative consequences.

41
Q

Six Steps of any Incident Response Process

A
  1. Preparation
  2. Identification
  3. Containment
  4. Eradication
  5. Recovery
  6. Lessons Learned
42
Q

Incident Response Plan (IRP)

A

Outlines what steps are needed and who is responsible for deciding how to handle the situation

43
Q

Act in Order of Volatility

A

Address multiple issues in order of volatility (OOV), the most volatile should be handled first. The amount of time evidence is available can vary and the most volatile will be harder to collect later.

44
Q

Some documentation that should be made during an incident.

A
  1. Capture a system image while it is in an exploited state for future reference
  2. Document network traffic and logs - this helps to identify trends during repeated attacks
  3. Capture video
  4. Record time offset
  5. Take Hashes (this is important evidence in identifying known, traceable software applications)
  6. Capture screenshots
  7. Talk to witnesses
  8. Track man hours and expenses
  9. Create an after-action report
45
Q

Tabletop Exercise

A

Simulation of a disaster

46
Q

Five levels of tabletop exercise testing

A
  1. Document review
  2. Walkthrough
  3. Simulation
  4. Parallel test
  5. Cutover test
47
Q

Computer Security Incident Response Team (CSIRT)

A

Incident Response Team - formalized or ad hoc team to respond to an incident after it happens.