Developing Incident Response Capabilities Flashcards

1
Q

A software developer wants to use a common framework for Java development. What could the software developer use?

A

Apache Struts

Apache Struts is a popular framework used to develop Java web applications. It was also associated with well-known vulnerabilities that targeted those types of applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An incident responder is setting up an incident response plan (IRP). What could best help the incident responder establish a policy?

A

NIST 800-61

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-61, “Computer Security Incident Handling Guide,” helps with incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An incident handler needs to perform hashing during an incident. What tool could the handler use?

A

ssdeep

Commonly used by antivirus programs, ssdeep is designed to compare files to identify matches. This is useful to identify functionally identical files that may be able to morph or obfuscate themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A forensic analyst is creating a copy of evidence. This is a part of which stage of the forensics process?

A

Analysis

During the analysis stage, the forensic analyst creates a copy of evidence for analysis, ensuring that the copy can be related directly to the primary evidence source. The system verifies the integrity of evidence copies by generating hashes on a recurring basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A forensics analyst is attempting to read file metadata during the course of an investigation. Which tool could they use?

A

Exiftool

Exiftool is a utility designed to read and write file metadata for many file formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A forensics analyst is conducting memory analysis for a police investigation. Which tool could the analyst use?

A

Volatility

Volatility can explore the contents of a memory dump and reveal information, such as running processes, open sockets, passwords, the contents of the clipboard, and other items contained within memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A web administrator is looking at attacks where malicious script is inserted directly into an at-risk/vulnerable web application. What type of attack is this?

A

Stored XSS

A stored cross-site scripting (XSS) attack occurs when malicious script is directly inserted into an at-risk web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A forensics expert is performing file carving during an investigation. Which tool could the forensics expert use?

A

Foremost

Foremost is a Linux-based forensic data recovery utility that uses file carving techniques to extract deleted or corrupted data from a disk partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Foremost is a Linux-based forensic data recovery utility that uses file carving techniques to extract deleted or corrupted data from a disk partition.

A

ASLR

Address space layout randomization (ASLR) makes it difficult for buffer overflow attacks to locate the area of memory needed to successfully perform an exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Flash developer has developed a web application that uses something similar to XML. What should the developer use to communicate the markup text type?

A

REST

JavaScript Object Notation (JSON) and Representational State Transfer (REST) is a text format used to store and transmit data. JSON is similar to XML, although simpler to understand in many aspects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly