IncidentResponse Flashcards

1
Q

Incident

A

The act of violating an explicit/implied security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident Response Process Order

A

Preparation, Detection, Analysis, Containment then Eradication, Recovery, Post-incident Learning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Hunting

A

Cybersecurity Method for finding hidden threats not caught by regular security monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Avisories and Bulletins

A

Published by vendors and security researchers when new TTPs and vulnerabilities are discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intelligent Fusion and Threat Data

A

Uses SIEM and analysis platforms to spot concerns into logs and real-world security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tabletop Exercise (TTX)

A

Exercise simulated incidents with controlled feedback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Forensics

A

Process of investigating and analyzing digital devices/data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disk Imaging

A

A bit-by-bit or logical copy of a storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Legal Hold

A

Formal notification that instructs all preservation for electronic data, documents, records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Electronic Discovery

A

Identifying/collecting/producing electronically store info during legal proceedings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Syslog/Rsyskig/Syslog-ng

A

Variations of syslog would all permit the logging of data from different types of systems in a central repository.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Journalctl

A

Linux command line utility used for carrying and displaying logs from journald.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NXLog

A

Multi-platform management tool to help with security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rsylog/Syslog-ng

A

Linux and Unix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NXLog

A

Linux, Unix, Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Netflow’s SFLow

A

Provides a means for exporting trunicated packets.

17
Q

Dashboards

A

Visually displays information from various systems, used in security operations centers for comprehensive views.

18
Q

Automated Report

A

Computer generated report created automatically.

19
Q

Vulnerability Scan

A

Generates scan reports automatically.

20
Q

Packet Capture

A

Gathers all data sent to and from a specific network device.