Domain 4.0: Operations and Incident Response Flashcards

1
Q

___ command line tool that tests network connectivity. good troubleshooting tool for determining whether a route is available to a host

A

ping: test reachability–determine round trip time, uses Internet control message protocol (ICMP), primary troubleshooting tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ network scanning tool that is often used in security auditing

A

nmap: network mapper–learn more about network devices, identify open ports/port scan, OS scan, service scan (version, name, details), additional scripts like Nmap scripting engine (NSE) that extends capabilities and does vulnerability scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ shows network statistics, including the protocol, local address, foreign address, and connection

A

netstat: network statistics: OS, show active connections, show binaries, do not resolve names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ is a network utility for gathering information from transport layer network connections

A

netcat: read or write to the network: open a port and send/receive traffic, lisen on port number, transfer data, scan ports and send data to a port, become a backdoor by running shell from a remote device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__ and ____ are troubleshooting tools that query DNS servers

A

dig (domain information groper)– more advanced domain information, nslookup–lookup info from DNS servers: canonical names, IP addresses, cache timers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___, ___ and __ are common command line tools for file display and manipulation

A

head (view first few lines of file: head -n[# of lines to show] [name of file]), tail (view last few lines of file, same format as head for command line), cat (combine file/files into another file: cat [file1.txt] [file2.txt] or cat [file1.txt] [file2.txt] > [both.txt]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

python is a ____-purpose programming

A

general

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is a packet analyzer tool to capture TCP/IP packets

A

tcpdmp (capture packets from command line, write packets to a file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is a command line shell and scripting interface for Microsoft windows environments

A

powershell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

label 5 forensics tools

A

dd (create a bit by bit copy of a drive, create a disk image or restore from a disk image), Memdump (copy info in system memory to the standard output stream, memory dump, copy to another host across the network), WinHex (universal hexadecimal editor for Windows, edit disks, files, RAM, disk cloning, secure wipe), FTK Imager (drive imagining tool, supports for many different file systems and full disk encryption methods) and autopsy (digital forensics on hard drives, smartphones, extract many different data types)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ ____ can be placed inline or in between the devices from which you want to capture traffic

A

protocol analyzers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

most common firewall config _____ include permissions for traffic to run from any source to any destination, unnecessary services running, weak authentication and log file negligence

A

errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a ____ web content filter can either prevent legitimate content or allow prohibited content

A

misconfigured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ authorization should be required before conducting vulnerability or penetration tests

A

written

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ ____ ____ includes preparation, identification, containment, eradication, recovery, and post-incident events such as lessons learned

A

incident response process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

order of ____ describes the order in which evidence should be collected, from the most volatile systems to the least volatile

A

volatility

17
Q

data in __ and ____ or ___ files is considered the most volatile

A

RAM (random access memory: browsing history, clipboard info, encryption keys, command history), swap/paging/pagefile (a place to store RAM when memory is depleted, similar to a RAM dump)

18
Q

____ of ___ ensures that evidence is properly handled

A

chain of custody

19
Q

data ____ during and after an incident includes capturing system images, traffic logs, video, time offset, hashes, screenshots and witness interviews

A

acquisition

20
Q

_____ ____ is a framework similar to a kill chain and provides a reference for incident response

A

MITRE ATT&CK:
identify point of intrusion
understand methods used to move around
identify potential security techniques to block future attacks

21
Q

the ____ ____ of ____ ____ places the basic components of malicious activity at one of 4 points: adversary, infrastructure, capability and victim

A

diamond model of intrusion analysis

22
Q

____ responses exercises can be discussion oriented or simulated

A

incident

23
Q

____ and _____ ensure the restoration of organizational functions in the shortest possible time, even if services resume at a reduced level of effectiveness or availability

A

BCP (business continuity plan), COOP (continuity of operations plan)