deck_2250368 Flashcards
Q1: What kind of intellectual property components grant the right to exclude others from selling an invention in the United States?
A1: Patents. A patent for an invention is the granting of a property to the inventor, issued by the Patent and Trademark Office. The right conferred by the patent grant is in the language of the statute and of the grant itself, the right to exclude others from making, using, offering for sale, or selling the invention in the United States or importing the invention into the United States. Copyrights protect original works of expression, such as novels, fine and graphic arts, music, phone records, photography, software, video, cinema, and choreography by preventing people from copying or commercially exploiting them without the copyright owner’s permission. Trademarks protect brand names and distinctive words, phrases, logos, symbols, slogans, and any other devices used to identify and distinguish products or services in the marketplace. Trade secrets protect sensitive information required for your business..
Q2: Which of the following describes sensitive intellectual property critical for your business?
A2: Trade secrets. Trade secrets protect sensitive information required for your business..
Q3: When a competitor creates a similar-looking but not identical mark, what are they using to attack the trademark?
A3: Confusion. Beyond counterfeiting a mark, an attacker could create a similar-looking mark to achieve confusion. Confusion involves a similarity in the overall impression created by the two marks, including the marks’ looks, phonetics, and underlying meanings..
Q4: What type of intellectual property would be protected by a copyright?
A4: An original artistic or literary work. A trademark prevents someone from using a similar mark. A copyright protects an original artistic or literary work. A patent protects an invention..
Q5: What is fair use of copyrighted material?
A5: An exception to the rights of a copyright holder that permits limited, third-party use of the material. Fair use limits the right of a copyright owner for purposes such as criticism, news reporting, teaching, and research. In general, nonprofit educational use is more acceptable. The amount of material copied is an issue. The economic effects should also be considered..
Q6: Most incident handlers move between two steps in their daily activity. Preparation is one step. What is the other step?
A6: Identification. The steady-state, day-to-day practices of most incident handlers are the first two steps: preparation and identification. Much time is spent getting ready to fight the next battle and looking for events that could be signs of trouble..
Q7: Of the following choices, which is an example of an event?
A7: Packet flooding within a network. Packet flooding within a network (could be bursty legitimate traffic) is an example of an event. Events are observable, measurable, occurrences in computer systems. An event is an occurrence that someone either directly experienced or that can be shown to have actually occurred. An event is something that is seen as a flash on the screen or is heard. It can also be something that is known to have occurred because it was collected in a log or audit file..
Q8: What are the steps of incident handling?
A8: Preparation, identification, containment, eradication, recovery, and lessons learned. The correct steps are preparation, identification, containment, eradication, recovery, and lessons learned..
Q9: In incident handling, what step must precede the containment phase?
A9: Identifying an incident’s existence. Once an incident has been defined, then you can move into the containment phase. Eradicate, recovery, and lessons learned occur after containment..
Q10: What defines a security incident?
A10: Harm done or threatened to a system. An incident refers to harm or the significant threat of harm..
Q11: Why is an incident-handling plan important?
A11: It will help you be prepared when an incident occurs.. All systems on the Internet will be subject to an incident at some point. It is important to have a plan in place for when this happens. Training your team on what to do is important, but it is not the reason for incident handling; instead, it is a form of preparation for incident handling..
Q12: Which of the following is the best choice for inclusion in a policy that governs the handler’s access to production systems during an incident?
A12: A process by which incident handlers can obtain necessary access during an incident. The incident-handling team must be able to access systems without the okay of system administrators. One idea is to keep passwords in a sealed envelope, although handlers should never use a privileged password unless they are qualified on that operating system. As encryption becomes ever more prevalent, an organization must set policy as to who owns secret keys and passphrases..
Q13: What should you consider before electing to use a video camera to record the incident- handling process?
A13: The tape may contain more information than you want to give away if the case goes to court.. Some organizations prefer to use video cameras. However, keep in mind that if your case does go to court, during the discovery process, you may have to turn the tape over to the opposing side. A tape may contain far more information about your operation than you want to give away..
Q14: Which of the following can be used to limit the presumption of privacy?
A14: Warning banners. Warning banners limit the presumption of policy..
Q15: Which of the following would be a reason to notify law enforcement of a security incident?
A15: Threat to public safety. When there is a threat to public safety, you must notify law enforcement..
Q16: When should you first contact local law enforcement regarding incident handling?
A16: Before an incident happens in order to develop contacts. It is important to develop a relationship with your local law enforcement representatives before an incident occurs. This will give you the right contacts so you do not waste time during an incident.\u00a0Having the relationship in place can only help when dealing with legal issues..
Q17: What can be used to reduce stress and the resulting errors on an incident handler during an incident?
A17: A checklist. Contact lists and secure communications are important and useful, but they focus on communications, which may or may not help reduce stress and lead to mistakes. Practice is extremely important, assuming you are correctly practicing the right thing. A checklist, however, provides direction and avoids many anticipated mistakes, which can reduce stress on the handler. Having a checklist to refer to on how to bring down a system or back up a system can help prevent errors and reduce the stress on the handler..
Q18: What is the primary role of management regarding incident handling?
A18: To approve procedures and policy before an incident occurs. The most important job that management has is to review the Incident Handling process during the Preparation phase and give their buy-in to the procedures. Management should also be given a status during the incident, but it is rare for a manager to be doing the hands-on work during an incident..
Q19: How would an incident handler define a war room?
A19: A secure room with copies of evidence from relevant incidents. A war room is a secured location where the incident handling team can display evidence for analysis..
Q20: Why might an organization decide against involving law enforcement after a computer security incident?
A20: Loss of control over how the incident is handled. Law enforcement may compel an organization to keep systems open and exposed to continued hacking. Law enforcement may have different goals in the case, and the organization could lose some control of how the incident is handled..
Q21: What part of an organization is an attacker most likely to target when attempting to socially engineer the organization?
A21: The help desk. If an attacker attempts to socially engineer an organization, one likely group is the help desk..
Q22: What must an incident handler do during the initial phases of an incident?
A22: Be calm and methodical about taking notes.. It is extremely important to remain calm and not rush yourself when handling an incident. Taking notes is very important and should not be put off until you have time, as your memory may not be 100% after working on the incident..
Q23: Which of the following organizations support interaction between law enforcement and commercial companies?
A23: HTCIA and Infragard. Contact local law enforcement before there is an incident. Get to know them through a local chapter of the HTCIA, ECTF, or Infragard, if such chapters exist in your area. Do a joint exercise with them and ask them questions in advance to try to determine what they are and are not interested in..
Q24: At what levels can events be detected during the identification phase?
A24: The network perimeter, the host perimeter, and the system level. Identification can occur at any of the following three levels: (1) the network perimeter, (2) the host perimeter, and (3) the host (or system) level..