Event and Incident Handling Flashcards

1
Q

What are the roles and responsibilities of an incident responder?

A

As first responders to security incidents, to protect an organization’s valuable assets by taking immediate actions to detect, prevent, and mitigate cyber-threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of security breaches you may encounter as an incident responder?

A
some of the common security breaches are:
Cross-site scripting
SQL injection attacks
DoS attack
Man in the middle attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What document do you need to restore a system that has failed?

A

a Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is port scanning? Why is it required?

A

When a network is scanned to identify open ports and services.

It allows you to see the state of the network. And check for unauthorized accesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a security incident?

A

an event that indicates that the sensitive data of an organization have been compromised or a security measure has failed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SIEM?

A

Security information and event management) threat detection and incident response system that helps take quick preventive actions against a possible security attack. through real-time monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Difference between HIDS and NIDS

A

Intrusion Detection System.
HIDS is host based monitors a system and idenitifies suspicious activity

NIDS is network based and checks traffic of all the devices connected to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an automated incidence response?

A

enable the incident response team to detect and respond to cyber threats and security incidents in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an incident trigger?

A

an event signaling the possibility of a cyber threat. When incident triggers are generated, an incident responder must be aware that an attack is in process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What steps would you take after a cybersecurity incident occurs?

A

Identification:
In this step, the security incident is identified and reported to the higher authorities. IR team tries to find the source of the security breach.

Triage and analysis:
Data is collected from various sources and analyzed further to find indicators of compromise.

Containment:
The affected systems are isolated to prevent further damage.

Post-incident activity:
This step includes documentation of information to prevent such security incidents in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to detect whether a file has changed in the system?

A

One way to compare the change in files is through hashing (MD5).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Advanced Persistent Threat? How to handle them?

A

when attackers bypass an organization’s security posture and remain undetected in the systems or network.
Handle them by proper access & administration control, pen testing and employee awareness training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How would you detect a storage-related security incident in the cloud?

A

monitoring storage units’ metadata for malicious content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the best practices to eliminate an insider attack?

A

Monitoring the employee behavior on systems

Conducting risk assessment

Documenting and establishing security controls and policies

Implementing secure backups and disaster recovery plans

Strict account management policies

Prevent employees from installing unauthorized software and visiting malicious sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To detect malicious emails, what steps would you take to examine the emails’ originating IP addresses?

A

Searching IP address in WHOIS database
Getting the IP address of the sender from the header of received mail
Opening email to trace its header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Cross-site scripting (XSS) attack, and how to avoid it?

A

the attacker runs the malicious scripts on a web page and can steal the user’s sensitive data.

Avoid by: 
Encoding the output
Applying filters at the point where input is received
Using appropriate response headers
Enabling content security policy
Escaping untrusted characters
17
Q

How important is a vulnerability assessment?

A

vulnerabilities are loopholes or security gaps present in the network that an attacker can use to instigate DoS (Denial of Service) attack or get unauthorized access to sensitive information. Cyber-crooks are continuously looking for new exploitable vulnerabilities to break into the systems. Therefore, it is essential to keep assessing the network at regular intervals. The assessment can be done either by using a SIEM tool or by manual testing.

18
Q

What are some network security tools?

A

Network monitoring tool: SIEM software such as Splunk
Packet sniffers: Wireshark, John-the-ripper
Encryption tools: Tor, TrueCrypt
Network intrusion and detection tools: Snort, Force point