Chapter 17 – Preventing and Responding To Incidents Flashcards
1
Q
- Which of the following is the best response after detecting and verifying an incident?
Contain it
A
Contain it
2
Q
- Which of the following would security personnel do during the remediation stage of an incident response?
Root cause analysis
A
Root cause analysis
3
Q
- Which of the following are DoS attack? (Choose three.)
Teardrop, Smurf, Ping of death
A
Teardrop, Smurf, Ping of death
4
Q
- How does a SYN flood attack work?
Disrupts the three-way handshake used by TCP
A
Disrupts the three-way handshake used by TCP
5
Q
- A web server hosted on the internet was recently attacked, exploiting a vulnerability in the operating system. The operating system vendor assisted in the incident investigation and verified that the vulnerability was not previously known. What type of attack was this?
Zero-day exploit
A
Zero-day exploit
6
Q
- Of the following choices, which is the most common method of distributing malware?
Drive-by downloads
A
Drive-by downloads
7
Q
- Of the following choices, what indicates the primary purpose of an intrusion detection system (IDS)?
Detect abnormal activity
A
Detect abnormal activity
8
Q
- Which of the following is true for a host-based intrusion detection system (HIDS)?
It monitors a single system.
A
It monitors a single system.
9
Q
- Which of the following is a fake network designed to temp intruders with unpatched and unprotected security vulnerabilities and false data?
Honeynet
A
Honeynet
10
Q
- Of the following choices, what is the best form of anti-malware protection?
Anti-malware protection at several locations
A
Anti-malware protection at several locations