Domain 7 security operations COPY Flashcards

1
Q

If we look at our Disaster Recovery Plan (DRP) for what to do when we are attacked, in which phase of incident management do we shut system access down?
A: Detection
B: Preparation
C: Response
D: Recovery

A

Explanation
D: Response
The response phase is when the incident response team begins interacting with affected systems and attempts to keep further damage from occurring as a result of the incident. This can be taking a system off the network, isolating traffic, powering off the system, or however our plan dictates to isolate the system to minimize both the scope and severity of the incident. Knowing how to respond, when to follow the policies and procedures to the letter and when not to, is why we have senior staff handle the responses. We make bit level copies of the systems, as close as possible to the time of incidence to ensure they are a true representation of the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is not true about continuous monitoring?
A. It involves ad hoc processes that provide agility in responding to novel attacks.
B. Its main goal is to support organizational risk management.
C. It helps determine whether security controls remain effective.
D. It relies on carefully chosen metrics and measurements.

A

the answer is A:

Continuous monitoring is a deliberate, data-driven process supporting organizational risk management. One of the key questions it answers is: are controls still effective at mitigating risks? Continuous monitoring could potentially lead to a decision to implement specific ad hoc processes, but these would not really be part of continuous monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which two numbers are required for DRBC

  1. sla, roi
  2. sle, aro
  3. rto, rpo
  4. itil, ale
A

rto and rpo (recovery time object and recovery point objective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how many DRPs are part of BC

A

there could be many (no limit) DR plans under the business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the goal of recovery

A

resumption of critical business functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When we are doing our digital forensics, in which order would we perform the steps?
A: identify, acquire, analyze, report
B: identify, analyze, acquire, report
C: analyze, identify, acquire, report
D: report, identify, analyze, report

A

A: identify, acquire, analyze, report
Explanation
The digital (computer) forensics process: Identify the potential evidence, acquire the evidence, analyze the evidence, make a report. We need to be more aware of how we gather our forensic evidence, attackers are covering their tracks, deleting the evidence and logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As part of our Disaster Recovery Plan (DRP), we are building our secondary data center 100 miles (160 km.) from our primary data center.

With which of these secondary sites would we MOST LIKELY be back up and running on our critical applications within 3 hours?

(Select all that apply).
A: warm site
B: cold site
C: hot site
D: redundant site

A

C and D
Explanation
Redundant site: Complete identical site to our production site, receives a real time copy of our data. If our main site is down the redundant site will automatically have all traffic fail over to the redundant site. Hot site: Similar to the redundant site, but only houses critical applications and systems, often on lower spec’d systems. We may have to manually fail traffic over, but a full switch can take an hour or less. Warm sites would take 4-24+ hours, cold sites can take weeks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What would we have our staff sign to acknowledge they understand and agree with their assigned responsibilities during a disaster?
A: MOU
B: MTT
C: MRA
D: MIT

A

A: MOU
Explanation
MOU/MOA (Memorandum of Understanding/Agreement): Our staff signs a legal document acknowledging they are responsible for a certain activity. If the test asks “A critical staff member didn’t show, and they were supposed to be there. What could have fixed that problem?” it would be the MOU/MOA. While slightly different they are used interchangeably on the test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does SOAR stand for

A

security orchestration, automation and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these is NOT protected by the 4th amendment in the US?
A: your internet history
B: anything search warranted
C: your emails
D: anything done online

A

B: anything search warranted
Explanation
We ensure our evidence is acquired in legal manner remember the US Constitution 4th amendment. The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated. Anything supinated, search warranted, turned over voluntary and in exigent circumstances (immediate danger of being destroyed), can allow law enforcement to bypass the 4th amendment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is BC focused on

  1. IT
  2. accounting
  3. operations
  4. continuity of the organization’s business operations
A

continuity of the organization’s business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As part of our Disaster Recovery Plan (DRP), we are building our secondary data center 100 miles (160 km.) from our primary data center.

With which of these secondary sites would we MOST LIKELY be back up and running on our critical applications within 3 hours?

(Select all that apply).
A: cold site
B: warm site
C: redundant site
D: hot site

A

Explanation – C and D
Redundant site: Complete identical site to our production site, receives a real time copy of our data. If our main site is down the redundant site will automatically have all traffic fail over to the redundant site. Hot site: Similar to the redundant site, but only houses critical applications and systems, often on lower spec’d systems. We may have to manually fail traffic over, but a full switch can take an hour or less. Warm sites would take 4-24+ hours, cold sites can take weeks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

As part of our disaster recovery response, we are paying a provider to keep a copy of our servers and data. The servers are to remain down always, with the exception of patches and database syncs, and are only to be spun up if we have a disaster. What would this be called?
A: redundant
B: mobile site
C: reciprocal
D: subscription site

A

D: subscription site
Explanation
Subscription/cloud site: We pay someone else to have a minimal or full replica of our production environment up and running within a certain number of hours (SLA). They have fully built systems with our applications and receive backups of our data, if we are completely down we contact them and they spin the systems up and apply the latest backups. How fast and how much is determined by our plans and how much we want to pay for this type of insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is recovery point object (RPO)

A

the amount of data loss tolerable when an incident or disaster occurs. usually expressed in number of transactions or data points. (how often are backups being done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Jane is doing network forensics on an attack. Which of these is a COMMON form used?
A: catch-as-you-can
B: stop, act, prevent
C: catch-and-release
D: stop and release

A

A: catch-as-you-can
Explanation
Network forensics: Systems used to collect network data for forensics use usually come in two forms: Catch-it-as-you-can: All packets passing through a certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage. Stop, look and listen: Each packet is analyzed in a basic way in memory and only certain information is saved for future analysis. This approach requires a faster processor to keep up with incoming traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Our main facility has been hit with a complete power outage and we need to set up a temporary command and control center. What would we be deploying?
A: eoc
B: drp
C: coop
D: eoo

A

Explanation — A
EOC (Emergency Operations Center): A central temporary command and control facility responsible for our emergency management, or disaster management functions at a strategic level during an emergency. It ensuring the continuity of operation of our organization. We place the EOC in a secure location if the disaster is impacting a larger area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In designing our backup strategy, you are asked if there any types of backups you can’t use together. Which of these would be the right answer?
A: full and incremental
B: Incremental and copy
C: differential and incremental
D: differential and copy

A

c: differential and incremental

18
Q

is DR (disaster recovery) a subset of BC (business continuity)

A

yes

19
Q

what is MTD (maximum tolerable downtime) or MAD (maximum allowable downtime)

A

the amount of time an organization can survive without an asset or process. after this time an organization may no longer be viable

20
Q

In which of the sub-plans of our Business Continuity Plan (BCP) would we look at for dealing with evacuating staff in an emergency?
A: OEP
B: CIRP
C: CCP
D: COOP

A

A: OEP
Explanation
OEP (Occupant Emergency Plan): How do we protect our facilities, our staff and the environment in a disaster event. This could be fires, hurricanes, floods, criminal attacks, terrorism, etc. Focuses on safety and evacuation, details how we evacuate, how often we do the drills and the training staff should get.

21
Q

We are using server clustering on critical applications. What is the MAIN purpose of server clustering?
A: Fault tolerance
B: Load balancing
C: traffic distribution
D: making configurations easier

A

A: Fault tolerance
Explanation
Clustering is designed for fault tolerance, often combined with load balancing, but not innately. Clustering can be active/active, this is load balancing, with 2 servers both servers would actively process traffic. Active/passive: There is a designated primary active server and a secondary passive server, they are connected and the passive sends a keep-alive or heartbeat every 1-3 seconds, “are you alive, are you alive…”

22
Q

should RPO be higher or lower than MTD

A

RPO should always be lower than MTD, otherwise there would be no sense of every trying because the company would cease to function

23
Q

what does a SOAR do

A

it takes the same ideas of a SIEM -collecting and aggregation of events from devices, categorizes, and analyzes incidents before issuing alerts. SOAR helps to automate responses to alerts

24
Q

In our incident management, what are the 3 LAST phases in order?
A: reporting, remediation, lessons learned
B: remediation, recovery, lessons learned
C: recovery, remediation, lessons learned
D: reporting, recovery, lessons learned

A

C: recovery, remediation, lessons learned
Explanation
The last 3 are recovery, remediation, lessons learned. The current exam lists a 7-step lifecycle, but does not include the first step in most incident handling methodologies preparation. Preparation > Detection (Identification) > Response (Containment) > Mitigation (Eradication) > Reporting > Recovery > Remediation > Lessons Learned (Post-incident Activity, Post Mortem, or Reporting).

25
Q

what is recovery time objective(RTO)

A

the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.

26
Q

what are the items that IR (incident response) plans typically contain

A
  1. definition of incident types (the different type of incident plans
  2. the incident response team (personnel)
  3. roles and responsibilities for the IR team in each different type of incident
  4. resources required - items like (security management tools, detection and response like SIEM and IDS). checklist and procedure documentation
  5. Incident management process must be laid out according to the lifecycle phases.
27
Q

When Jane is designing the specifications in our Disaster Recovery Plan (DRP), she is including technology and countermeasures for Internet Service Provider (ISP) outages. Which type of disasters is she focused on?
A: Environmental
B: Natural
C: All of these
D: man made

A

A: Environmental
Explanation
Environmental: This is not nature, but the environments we work in, the power grid, the internet connections, hardware failures, software flaws, …

28
Q

what is the goal of restoration

A

return to normal service levels at the primary site

29
Q

what is an event

A

any observable change that does not require action to be taken.
examples: routine user or system actions, such as user successfully logging into a system. a file being accessed.

30
Q

what is an incident

A

events that are both unplanned and have an adverse impact on the organization. they typically require investigation and remediation.

31
Q

what department is DR focused on restoring

  1. accounting
  2. business continuity
  3. IT
  4. the business
A

IT

32
Q

who can declare a disaster

A

senior most security personnel (senior management)

33
Q

Our main facility has been hit with a complete power outage and we need to set up a temporary command and control center. What would we be deploying?
A: EOO
B: EOC
C: DRP
D: COOP

A

B: EOC
Explanation
EOC (Emergency Operations Center): A central temporary command and control facility responsible for our emergency management, or disaster management functions at a strategic level during an emergency. It ensuring the continuity of operation of our organization. We place the EOC in a secure location if the disaster is impacting a larger area.

34
Q

DR (disaster recovery) is a subset of what other plan?

A

BC (business continuity)

35
Q

why is declaring a disaster so that the DR plan kicks in left to senior management

A

there is significant financial cost and the DR suspends normal processes and operations so its not a decision to be taken lightly by an untrained staff member.

36
Q

7 steps to incident management

A
  1. detection
  2. response
  3. mitigation
  4. reporting
  5. recovery
  6. remediation
  7. lessons learned
37
Q

Which sub-plan would we look at in our Business Continuity Plan (BCP) for dealing with continuing our day to day operations?
A: ccp
B: coop
C: oep
D: cirp

A

Explanation B:
COOP (Continuity of Operations Plan): How we keep operating in a disaster, how do we get staff to alternate sites, what are all the operational things we need to ensure we function even if at reduced capacity for up to 30 days

38
Q

incremental backup - explain

A
  • backups changes from the last incremental backup
  • the archive bit is reset
  • each incremental backup is considerably smaller
  • if a restore is needing to be done, all incremental backs to, and including the last full backup would need to be restored
39
Q

differential backups - explain

A
  • this backups all the day changed since the last FULL backup
  • each differential backup is much larger
  • if a recovery was needed, you would only need the most recent differential and the last full backup
  • less backups needed during full but much more backup storage needed
40
Q

recovery site

warm site

A
  • warm site mostly has everything that a hot site has minus any type of backup
  • backups need to be transported to a warm site, then recover can start
  • recovery time on warm site, at least 12 hours