Incident Handling Flashcards

1
Q

What is a comprehensive incident report completed on all CAT I, II, IV and VIIs

A

AFCIR (AF Cyber Incident Report)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Category 1

A

Root Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Explained Anomaly

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User Level

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Investigating

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Mission Assurance Categories (MACs)

A

MAC I, II, III

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the phases contained in the standard AF incident response process

A

Preparation, Detection, Isolation & Containment, Secure, Recover, Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What incident response phase sees 90% accomplished when the system is removed from the network

A

Isolation and Containment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What MAC says the system is IMPORTANT to the support of deployed forces

A

MAC level II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What incident response phase sees Operational & technical impact assessed

A

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Category 4

A

Denial Of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Category 6

A

Reconnaisance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Category 8

A

Investigating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What incident response phase sees advanced forensic analysis, malware submitted to AV vendors, software vendors notified of exploited vulnerabilities

A

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What incident response phase sees Signatures Developed

A

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who produces/disseminates the AFCIR

A

33rd NWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What incident response phase sees the SysPOC completed

A

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What incident response phase sees New TTP potentially incorporated into authorized procedures

A

Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Of the 9 CAT events, which one is User Level Intrusion

A

CAT II: (Incident)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Of the 9 CAT events, which one is Unsuccessful Activity Attempt

A

CAT III: (Event)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What MAC says the system is VITAL to operational readiness or mission effectiveness of deployed forces

A

MAC level I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Of the 9 CAT events, which one is NON-COMPLIANCE Activity/Poor Security Practice

A

CAT V: (Event)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reconnaisance

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hi there What does this mean?

Of the 9 CAT events, which one is Root Level Intrusion

A

CAT I: (Incident)

16
Q

Category 3

A

Unsuccessful Login Attempt

17
Q

If needed in Detection phase, who will be called for forensics?

A

33 NWS FAT (Forensic Analysis Team)

19
Q

Which CAT Events constitutes incidents

A

CAT I, II, IV, & VII

20
Q

What is the main purpose of FRED/FLUFFE

A

Find True Source IP

21
Q

What incident response phase sees Compromised system restored to pristine state

A

Recover

23
Q

Root Level

A

Incident

24
Q

Of the 9 CAT events, which one is Explained Anomaly

A

CAT IX: (Event)

25
Q

What incident response phase sees compromised credentials reset

A

Isolation and containment

26
Q

Example of: Root

A

Unrestricted Access to an Information system

27
Q

Example of: Reconnaissance

A

Nmapping Subnet

29
Q

Of the 9 CAT events, which one is Under Investigation

A

CAT VIII: (Event)

32
Q

What incident response phase sees Cyber Operational Risk Assessment provided if data extracted

A

Secure

33
Q

Of the 9 CAT events, which one is Malicious Logic

A

CAT VII: (Incident)

34
Q

What 4 units are involved with the Preparation phase of Incident Response

A

33rd NWS, AFOSI, INOSC, NCC Personnel

35
Q

What incident response phase see suspicious activity, base is tasked to investigate and run First Responder’s Evidence Disk (FRED)?

A

Detection

36
Q

What is designed to acquire data from a live system

A

FRED/FLUFFE

37
Q

Category 5

A

Non-Compliance

38
Q

Unsuccessful Login Attempt

A

Event

39
Q

What incident response phase sees the system removed if not mission critical and an upgrade determination is made?

A

Detection

40
Q

What incident response phase sees blocks accomplished (IP/MAC, Ports/DNS Blackhole)

A

Isolation and Containment

41
Q

What is a remote investigation solution to collect, process, search, analyze, and report

A

Encase

42
Q

Category 7

A

Malicious Logic

43
Q

What MAC says the INFORMATION is necessary for the conduct of day to day business

A

MAC level III

44
Q

Category 9

A

Explained Anomaly

45
Q

What incident response phase sees Mission Assurance Category ID’d

A

Secure

46
Q

Denial Of Service

A

Incident

47
Q

What is very important in finding the system during Detection

A

True Source IP (TSIP)

48
Q

How much time does the 33rd have to produce an AFCIR

A

21 days

49
Q

Of the 9 CAT events, which one is Denial of Service

A

CAT IV: (Incident)

50
Q

Of the 9 CAT events, which one is Reconnaissance

A

CAT VI: (Event)

51
Q

Malicious Logic

A

Incident

52
Q

Non-Compliance

A

Event

53
Q

What incident response phase sees AF Cyber Incident Report generated (33rd NWS)

A

Lessons Learned

54
Q

Category 2

A

User Level

55
Q

What document governs guidelines for the Preparation phase of Incident Response

A

CJCSM 6510 change 3 gives us all guidelines