Lecture 4 pt. 5 Flashcards

1
Q

What does NIST Special Publication 800-61 cover?

A

The major phases of the incident response process

NIST defines the incident response process in detail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is considered one of the most challenging phases of the incident response process?

A

The detection and analysis phase

It might be the most difficult task in incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is critical to eliminating network blind spots?

A

Implementing analytics and correlation tools

Typical networks have ‘blind spots’ where anomalous traffic goes undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What must the incident response team do when an incident is detected?

A

React quickly to analyze and validate each incident

This is done by following a predefined process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some NIST recommendations for incident analysis?

A
  • Profile networks and systems
  • Understand normal behaviors
  • Create a log retention policy
  • Perform event correlation
  • Maintain and use a knowledge base
  • Use Internet search engines for research
  • Create effective communication processes
  • Run packet sniffers to collect data
  • Filter the data
  • Seek assistance from others
  • Keep all host clocks synchronized
  • Know different types of attacks and attack vectors

These recommendations help in effective incident analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: The _______ phase of incident response involves validating and analyzing incidents.

A

[detection and analysis]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does deterministic analysis evaluate?

A

The potential success of an exploit by estimating the likelihood of subsequent successful steps

It focuses on the conditions necessary for a successful exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does probabilistic analysis assume about the exploit process?

A

That the port numbers used by an exploit can be predicted with some degree of confidence

This analysis uses statistical techniques to evaluate risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Security Onion?

A

An open-source suite of Network Security Monitoring (NSM) tools that run on Ubuntu Linux

It can be installed as a standalone or as a sensor and server platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three core functions of Security Onion tools?

A
  • Full packet capture
  • Network-based intrusion detection systems (NIDS)
  • Host-based IDSs (HIDS)

These functions support cybersecurity analysts in monitoring and analyzing network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What generates security alerts in Security Onion?

A

NSM tools, systems, and security devices

Alerts generally include five-tuples information and timestamps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the Sguil tool?

A

To integrate alerts from multiple sources into a timestamped queue for investigation

Analysts classify, escalate, or retire alerts using Sguil.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Sguil application window display?

A

A queue of alerts with color-coded status indicating event severity

It helps analysts prioritize alerts for investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly