Chapter 12 Flashcards
During a recent site survey, you found a rogue wireless access point on your network. Which of the following actions should you take first to protect your network while still preserving evidence?
See who is connected to the access point and attempt to find the attacker.
Run a packet sniffer to monitor traffic to and from the access point.
Disconnect the access point from the network.
Connect to the access point and examine its logs for information.
Disconnect the access point from the network.
You are conducting a forensic investigation. The attack has been stopped. Which of the following actions should you perform first?
Stop all running processes.
Turn off the system.
Remove the hard drive.
Document what is on the screen.
Document what is on the screen.
When you conduct a forensic investigation, which of the following initial actions is appropriate for preserving evidence?
Stop all running processes.
Turn off the system.
Remove the hard drive.
Document what is on the screen.
Document what is on the screen.
What is the best definition of a security incident?
Interruption of productivity
Compromise of the CIA
Criminal activity
Violation of a security policy
Violation of a security policy
What is the purpose of audit trails?
To detect security-violating events.
To correct system problems.
To prevent security breaches.
To restore systems to normal operations.
To detect security-violating events.
After an intrusion has occurred and the intruder has been removed from the system, which of the following is the best step or action to take next?
Deploy new countermeasures.
Back up all logs and audits regarding the incident.
Restore and repair any damage.
Update the security policy.
Back up all logs and audits regarding the incident.
Which of the following is an important aspect of evidence-gathering?
Restore damaged data from backup media.
Monitor user access to compromised systems.
Back up all log files and audit trails.
Purge transaction logs.
Back up all log files and audit trails.
As a security analyst, you suspect a threat actor used a certain tactic and technique to infiltrate your network. Which incident-response framework or approach would you utilize to see if other companies have had the same occurrence and what they did to remedy it?
Mitre Att@ck
Diamond Model of Intrusion Analysis
Cyber Kill Chain
Communication plan with stakeholders
Mitre Att@ck
As a security analyst, you have discovered the victims of an malicious attack have several things in common. Which tools would you use to help you identify who might be behind the attacks and prevent potential future victims? (Select two.)
Disaster recovery plan
Mitre Att@cks
Cyber Kill Chain
Implement appropriate stakeholder management
Diamond Model of Intrusion Analysis
Mitre Att@cks
Diamond Model of Intrusion Analysis
You are in charge of making sure the IT systems of your company survive in case of any type of disaster in any of your locations. Your document should include organizational charts, phone lists, and order of restore. Each business unit should write their own policies and procedures with guidelines from corporate management. Which of the following documents should you create for this purpose?
Disaster recovery plan
Incident-response team charter
Business continuity plan
Communication plan
Business continuity plan
Your browser has blocked your from your crucial secure intranet sites. What could be the problem?
You are using HTTP instead of HTTPS.
Your SSL certificate status has been revoked.
You misconfigured a content filter.
The firewall administrator set up a rule that blocked the users.
Your SSL certificate status has been revoked.
You would like to make sure users are not accessing inappropriate content online at work. Which endpoint security strategy would you employ?
Content filtering
URL filters
Firewall rules
Mobile device management (MDM)
Content filtering
You want to allow RDP 3389 traffic into your network for a group of users to access a particular workstation that has a special application in your office. Which endpoint security tool would you use to make this happen?
URL filters
Firewall rules
Data monitoring apps
Content filters
Firewall rules
You need to remotely wipe an android phone for one of your rogue users. Which endpoint tool would you use?
Mobile application management (MAM)
Quarantining
MAM-WE
Mobile device management (MDM)
Mobile device management (MDM)
This application endpoint-protection rule implicitly denies unless added to the rule. Which of the following processes describes this?
Content filtering
Blacklisting
Quarantining
Whitelisting
Whitelisting
You would like to enhance your incident-response process and automate as much of it as possible. Which of the following elements would you need to include? (Select two.)
Blacklisting
Runbooks
Quarantining
Whitelisting
Playbooks
Runbooks
Playbooks
You have detected and identified a security event. What’s the first step you should complete?
Containment
Segmentation
Isolation
Playbook
Containment
You need to limit a compromised application from causing harm to other assets in your network. Which strategy should you employ?
SOAR
Isolation
Segmentation
Containment
Isolation
You need to limit the impact of a security breach for a particular file server with sensitive company data. Which strategy would you employ?
Containment
Isolation
Segmentation
SOAR
Segmentation
As a security analyst, you are looking for a platform to compile all your security data generated by different endpoints. Which tool would you use?
SOAR
MDM
GDPR
MAM
SOAR
Which of the following components are the SIEM’s way of letting the IT team know that a pre-established parameter is not within the acceptable range?
Dashboard
Trends
Sensors
Alerts
Alerts
Some users report that frequent system crashes have started happening on their workstations. Upon further investigation, you notice that these users all have the same application installed that has been recently updated. Where would you go to conduct a root cause analysis?
Security log
Network log
Firewall log
Application log
Application log
You suspect cache poisoning or spoofing has occurred on your network. Users are complaining of strange web results and being redirected to undesirable sites. Which log would help you determine what is going on?
Application logs
Security logs
DNS logs
Network logs
DNS logs
You suspect a bad video driver is causing a user’s system to randomly crash and reboot. Where would you go to identify and confirm your suspicions?
Application logs
SIP logs
Dump files
Syslog
Dump files
Which of the following is a standard for sending log messages to a central logging server?
Syslog
OVAL
Nmap
LC4
Syslog
You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would best protect the log files?
Use syslog to send log entries to another server.
Configure permissions on the log files to prevent access.
Take a hash of the log files.
Encrypt the log files.
Use syslog to send log entries to another server.
Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts has occurred.
Which log type should you check?
Security
System
Performance
Firewall
System
Which log file type is one of the most tedious to parse but can tell you exactly when users log onto your site and what their location is?
Web server logs
System logs
Event logs
Authentication logs
Web server logs
You would like to get a feel for the amount of bandwidth you are using in your network. What is the first thing you should do?
Create data points.
Choose a protocol.
Set intervals.
Establish a baseline.
Establish a baseline.
You are worried about email spoofing. What can be put throughout an email’s header that provides the originating email account or IP address and not a spoofed one?
Timestamp
Data points
Metadata
X-headers
X-headers
Which two types of service accounts must you use to set up event subscriptions?
Local event administrators account
Collector computer account
Network server machine account
Default machine account
Specific user service account
Default machine account
Specific user service account
By default, events received from the source computers in Event Subscription are saved in which log?
Application log
Forwarded Events log
Security log
System log
Forwarded Events log
You set up Event Subscription, but you are getting an overwhelming amount of events recorded. What should you do?
Use the Runtime Status link
Define a filter
Choose the correct subscription type
Use the default machine account
Define a filter