ECIHv2 Academia Questions Flashcards
What are the Information Security Threat Categories?
Host Threats
Network Threats
Application Threats
DNS and ARP Poisoning is what type of Information Security Threat Category?
Network Threats
A person or entity that is responsible for the incidents or has the potential to impact the security of an organization’s network is what type of actor?
Threat Actor
Script Kiddies, Organized Hackers and State Sponsored Attackers are all part of what?
Threat Actors
Recovery, Process Review and Practice are all part of which Incident Management guidelines?
OWASP
Jenny works on an Incident Response team for her organization. After a major incident, she is asked to check and verify as much as possible to get a positive confirmation from each party that in their opinion, everything is operating normally again. What Practice is Jenny taking part in?
Eradication and Recovery
Which standard specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of the organization?
ISO/IEC 27001:2013
The NERC 1300 Cyber Security standard stands for what?
North American Electric Reliability Corporation
Federal law requires federal agencies to report incidents to the which Incident Response Center?
Federal Computer Incident Repsonse Center
Accurately detecting and assessing incidents are the most challenging and essential part of…
Signs of an Incident
What are the advantages of an Incident Response Orchestration?
It includes automated alarms that detect the incident and alert the response personnel with details
It allows responders to remotely assess the incident analysis results and manage the actions
It allows responders to configure different solutions to interact and streamline incident response action
Loss of productive hours, loss of business, and loss of theft of resources are considered…
Tangible Costs
What are the benefits when it comes to Incident handling and response (IH&R)?
The IH&R process provides a focused and structured approach for restoring normal business operations as quickly as possible after an incident
The decision to establish IH&R process is affected by inputs, complaints, and queries from all the stakeholders involved in the organization’s business processes
IH&R processes differ from organization to organization according to their business and operating environment
IH&R mission statements define the ____ and _____ of the planned incident handling and response capabilities
Purpose and Scope
Incident response procedures, also referred to as ___________, provide detailed processes to implement guidelines defined by IH&R plan and policy
Standard operating procedures (SOPs)
Which group is responsible for examining the computer network traffic for signs of incidents or attacks such as DoS, DDoS, firewall breach, or other malicious code?
Network Administrators
Organizations must implement several security controls. Which security control ensures that only selected or eligible employees have access to sensitive data, critical devices, and other necessary resources required to accomplish the assigned tasks?
Access Controls
Organizations must secure the network communications by implementing Packet Filters, IPsec, Virtual Private Network, and Secure Shell. Which is responsible for authenticating and validating the packets during transmission?
IPsec
A successful backup strategy must have two key features:
Security & Real-Time Offsite Backup
_______ refers to a contract between the organization and an insurer to protect related individuals from different threats and risks
Cyber Insurance
ManageEngine ServiceDesk Plus and AlienVault OSSIM are both websites used as
Ticketing Tools
Loss of personal password, failure to download antivirus signatures, and unsuccessful scans and probes in the networks are considered incidents at a _______
Low Level
Denial-of-Service attacks, the presence of harmful viruses, worms, and Trojan horse, or Suspected break-in in any computer of a company are all considered incidents at a _______
High Level
Report writing tools help incident handlers to generate efficient reports on detected incidents during incident handling and response process. What website is considered a note taking application that works on Windows, Linux, and MacOS X?
keepnote.org
What are examples of the objective of computer forensics?
Identify, gather, and preserve the evidence of a cyber crime
Find vulnerabilities and security loopholes
Recover deleted and hidden files
What is an important guideline for building an investigation team?
To appoint a person as a technical lead among the team members
James is a part of an incident response team that wants to ensure proper reaction against any mishap. Being forensically ready will allow him and his team to:
Eliminate the threat of repeated incidents
What refers to the first action performed after occurrence of a security incident?
First Response
The _____ ensure that the evidence is stored, examined, preserved, and examined in a way that protects the reliability and correctness of the evidence.
Principles of digital evidence collection
If the victim computer has an internet connection, the first responder must?
Unplug the network cable from the router and modem
What is the process of imaging or collecting information from various media in accordance with certain standards for analyzing its forensic value?
Forensic Data Acquisition
Volatile data is fragile and lost when the system loses power or the user switches it off. Where can this data be found?
Registries
Cache
RAM
What are tools used to calculate the hash value?
HashCalc
MD5 Calculator
HashMyFiles
The incident responder should collect information regarding network connections to and from the affected system, immediately after the report of any incident. What is a tool that can help gather this information?
Netstat
The first responder needs to prepare and check several prerequisites such as the availability of tools, reporting requirement, and ______ in order to conduct a successful investigation
Legal clearances
Andrea is a first responder and she wants to use forensics analysis tools to help her with collecting, managing, transferring, and storing necessary information required during forensics investigation. Which would be a beneficial tool for her to use?
Helix3
What is the most common type of attacks against any enterprise?
Malware
Which type of Malware is used to trick the victim into performing predefined action?
Trojan Horse
Which type of malware is access the victim’s computer or a network without the user’s knowledge?
Backdoor
What is considered a huge network of compromised systems used by attackers to perform denial-of-service (DoS) attacks?
Botnet
A type of Trojan that downloads other malware (or) malicious code and files from the internet on to the PC or device?
Downloader
Instant messenger applications, network propagation, email attachments, and decoy applications are all common ways attackers can _____?
Send a malware into a system
Jose is an incident responder who wants to eradicate malware security incidents. What steps should he include?
Content Filtering Tools & Network Security Devices
Blacklist & Antivirus
Manual Scan & Fixing Devices