Chapter 17: Preventing and Responding to Incidents Flashcards

1
Q

an ____ is any event that has a negative effect on the confidentiality, integrity, or availability of an organization’s assets.

A

incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident management steps

A

Detection
Response
Mitigation
Reporting
Recovery
Remediation
Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____control attempts to thwart or stop unwanted or unauthorized activity from occurring.

A

preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ____ control attempts to discover or detect unwanted or unauthorized activity.

A

detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ___ attack is another type of flood attack, but it floods the victim with Internet Control Message Protocol (ICMP) echo packets instead of with TCP SYN packets.

A

smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ attacks are similar to smurf attacks. However, instead of using ICMP, it attack uses UDP packets over UDP ports 7 and 19.

A

Fraggle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ___ flood attack floods a victim with ping requests.

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _____ attack used oversized ping packets. Some operating systems couldn’t handle them. In some cases, the systems crashed, and in other cases, the attack caused a buffer overflow error.

A

ping-of-death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ attack fragments data packets, making them difficult or impossible to be put back together by the receiving system. This often caused systems to crash.

A

teardrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ exploit refers to an attack on a system exploiting a vulnerability that is unknown to others.

A

zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This IDS method uses a database of known attacks developed by the IDS vendor.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This IDS method starts by creating a baseline of normal activities and events on the system.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The most important protection against malicious code is the use of ____ software with up-to-date signature files and heuristic capabilities.

A

antimalware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a form of nonstatistical sampling. It selects only events that exceed a clipping level, which is a predefined threshold for the event.

A

Clipping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It’s also important to monitor traffic leaving a network to the internet, also called ____ monitoring. This can detect the unauthorized transfer of data outside the organization, often referred to as data exfiltration.

A

egress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ refers to a group of technologies that allow organizations to respond to some incidents automatically.

A

Security orchestration, automation, and response (SOAR)