Chapter 17 – Preventing and Responding To Incidents Flashcards

1
Q
  1. Which of the following is the best response after detecting and verifying an incident?
    Contain it
A

Contain it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following would security personnel do during the remediation stage of an incident response?
    Root cause analysis
A

Root cause analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which of the following are DoS attack? (Choose three.)

Teardrop, Smurf, Ping of death

A

Teardrop, Smurf, Ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. How does a SYN flood attack work?

Disrupts the three-way handshake used by TCP

A

Disrupts the three-way handshake used by TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A web server hosted on the internet was recently attacked, exploiting a vulnerability in the operating system. The operating system vendor assisted in the incident investigation and verified that the vulnerability was not previously known. What type of attack was this?
    Zero-day exploit
A

Zero-day exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Of the following choices, which is the most common method of distributing malware?
    Drive-by downloads
A

Drive-by downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Of the following choices, what indicates the primary purpose of an intrusion detection system (IDS)?
    Detect abnormal activity
A

Detect abnormal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following is true for a host-based intrusion detection system (HIDS)?
    It monitors a single system.
A

It monitors a single system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following is a fake network designed to temp intruders with unpatched and unprotected security vulnerabilities and false data?
    Honeynet
A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Of the following choices, what is the best form of anti-malware protection?
    Anti-malware protection at several locations
A

Anti-malware protection at several locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly