Ch17 Flashcards

1
Q

List the incident response steps

A
Detection
Response
Mitigation
Reporting
Recovery
Remediation
Lessons Learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After detecting and verifying an incident, the first response is

A

contain the incident while protecting evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what 2 stages include root cause analysis to determine the cause and recommend solutions to prevent a reoccurrence.

A

first remediation stage and then lessons learned stages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what stage is where a system may need to be rebuilt

A

recovery stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is an active response of an IDS

A

actively changing the environment, some people refer to an active IDS as an IPS such as block malicious traffic before it reaches its target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IPS must be placed inline with the network traffic

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

monitors a single system and hackers can discover and disable them

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

monitors network traffic and is not visible to hackers

A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a system that often has pseudo flaws and fake data to lure intruders.

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the difference between honeypot and padded cell

A

honeypot lures attacker but the attacker is transferred to a padded cell usually by IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what uses precise mathematical functions to extract meaningful information from a large volume of data

A

Statistical sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a form of nonstatistical sampling that records only events that exceed a threshold

A

Clipping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is reporting the incident based on policies and governing laws the first step

A

No - Organizations report the incident based on policies and governing laws, but this is not the first step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

attempts to identify the cause of the incident and steps that can be taken to prevent a reoccurrence

A

Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Do you gather the evidence before, during or after containing an incident

A

important to protect evidence while trying to contain an incident, but gathering the evidence will occur after containment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

most common distribution method for malware

A

drive by download