Eradication, Recovery and Post-incident Actions Flashcards

1
Q

Remove the cause of the incident and bring the system back to a secure state

A

Eradication and Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The complete removal and destruction of the cause of the incident
The simplest option for eradicating a contaminated system is to replace
it with a clean image from a trusted store

A

Eradication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A group of procedures that an organization uses to govern the disposal of
obsolete information and equipment, including storage devices, devices with
internal data storage capabilities, and paper records

A

Sanitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A method of sanitizing a self-encrypting drive by erasing the media encryption key
Cryptographic erase (CE) is a feature of self-encrypting drives

A

Cryptographic Erase (CE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A method of sanitizing a drive by overwriting all bits on a drive to zero
Zero-fill is not a reliable method to use with SSDs and hybrid drives

A

Zero-fill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A method of sanitizing a solid-state device using manufacturer provided software

A

Secure Erase (SE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A method of sanitizing that utilizes physical
destruction of the media by mechanical shredding, incineration, or degaussing
Secure disposal should be performed to sanitize media with top secret or highly
confidential information

A

Secure Disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Eradication Actions

A

Reconstruction
Reimaging
Reconstitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A method of restoring a system that has been sanitized using scripted installation
routines and templates

A

Reconstruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A method of restoring a system that has been sanitized using an image-based
backup

A

Reimaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A method of restoring a system that cannot be sanitized using manual removal,
reinstallation, and monitoring processes

A

Reconstitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Seven Steps for Reconstitution

A

o Analyze processes and network activity for signs of malware
o Terminate suspicious processes and securely delete them from the system
o Identify and disable autostart locations to prevent processes from executing
o Replace contaminated processes with clean versions from trusted media
o Reboot the system and analyze for signs of continued malware infection
o If continued malware infection, analyze firmware and USB devices for infection
o If tests are negative, reintroduce the system to the production environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remove the cause of the incident and bring the system back to a secure state
Actions taken to ensure that hosts are fully reconfigured to operate the business
workflow they were performing before the incident occurred

A

Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Actions taken to ensure that hosts are fully reconfigured to operate the business
workflow they were performing before the incident occurred

A

Patching
Permissions
Logging
System Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Installing a set of changes to a computer program or its supporting data designed
to update, to fix, or to improve it

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

All types of permissions should be reviewed and reinforced after an incident

A

Permissions

17
Q

Ensure that scanning and monitoring/log retrieval systems are functioning
properly following the incident

A

Logging

18
Q

Ensure that scanning and monitoring/log retrieval systems are functioning
properly following the incident

A

Logging

19
Q

The process of securing a system’s configuration and settings to reduce IT
vulnerability and the possibility of being compromised

A

System Hardening

20
Q

Occurs once the attack or immediate threat has been neutralized and the system is
restored to secure operation

A

Post-Incident Activities

21
Q

An essential analyst skill that is used to communicate information about the
incident to a wide variety of stakeholders

A

Report Writing

22
Q

A report written for a specific audience with key information about the incident
for their use

A

Incident Summary Report

23
Q

The preservation of evidence based upon the required time period defined by
regulations if there is a legal or regulatory impact caused by an incident

A

Evidence Retention

24
Q

An analysis of events that can provide insight into how to improve response
processes in the future

A

Lessons Learned