Chapter 10: Incident Response Flashcards

Understand Incident Response

1
Q

What are the four steps to the NIST incident response life cycle?

A
  • Preparation
  • Detection & Analysis
  • Containment, Eradication & Recovery
  • Post-incident Activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

{Blank}, which includes the activities used to put together an incident response plan and team.

A

Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

{Blank}, which identifies that an incident is taking place and determines the extent of the incident’s impact.

A

Detection & Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

{Blank}, which limits the damage caused by an incident, removes the effects of the incident, and restores normal operations.

A

Containment, Eradication & Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

{Blank} which analyzes the response process and identifies lessons learned to improve future response efforts.

A

Post-incident Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Building an Incident Respeonse Team

One of the most important task that you’ll ubdertake in your incident response program is to build and staff your incident response team. This team will likely need to be available on a 24/7 basis, and should have a primary and backup personnel to cover vacations as well as extended periods of operation.

What are some of the groups that should be represented in a incident response team?

A
  • Management
  • Information security personnel
  • Physical security team members
  • Techinical SMEs, such a DB Admin, Developers, System Engineers, and virtualization experts
  • Legal counsel
  • Public relations and marketing staff
  • HR team members
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An incident communicatins plan should cover both {blank} and {blank} communications.

A

Internal; external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

{Blank} hekp ensure that the appropriate people within your organization know about an incident at the right time and are provided with the right information.

A

Incident notification and escalation procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some information sources that can contribute data crucial to identifying and analyzing a possible security incident?

A
  • Intrusion detection and prevention systems
  • Firewalls
  • Authentication systems
  • System integrity monitors
  • Vulnerability scanners
  • System event logs
  • NetFlow connections records
  • Antimalware packages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

{Blank} system act as centralized log repository and analysis solutions.

A

Security information and even management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The highest priority of a first responder during incident response is to?

A

Quickly contain the damage caused by the security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Jason is monitoring his organization’s SIEM system watching for signs of unusual activity. Which phase of the NIST incident response process best describes his work?

A. Preparation
B. Detection & Analysis
C. Post-incident activity
D. Containment, eradication & recovery

A

Detection & analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

During his monitoring work, Jason identifies a high-priority security incident in progress. What should be his first priority?

A. Identifying lesson learned
B. Notifying senior management
C. Recovering normal operations
D. Containing the damage

A

Containing the damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly