LP - Automation, Orchestration, & Incident Response Flashcards

1
Q

Orchestration involves managing several or many

A

automated tasks or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Automation invooles generating a single task to run automatically

A

without any human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IdM stands for

A

Identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security group firewalls are on layer

A

3/5 and are stateful packet filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Benefits of Automation

A
  1. Efficiency and productivity
  2. Time Savings
  3. Enforcing baselines
  4. Standard infrastructure configuration
  5. Secure scalability
  6. Employee retention
  7. Reaction time
  8. Force multiplier
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SPOF stands for

A

single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident Response Life Cycle

A

Preparation - detection - analysis and escalation - containment - eradication and recovery - lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IRT stands for

A

incident response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MSSP stands for

A

managed security service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PUPs stand for

A

potentially unwanted programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RCA stands for

A

root cause analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Root cause analysis (RCA) steps

A
  1. Define the problem
  2. Collect data
  3. Identify possible causal factors
  4. Identify the root cause(s)
  5. Recommend and implement solutions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Kill Chain is

A

A - advanced - Targeted, coordinated, purposeful
P- persistent - Targeted, coordinated, purposeful
T - threat - Person(s) with intent, opportunity and capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

7-step Cyber Kill Chain

A
  1. Recon
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command and control
  7. Exfiltration of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

E-discovery phases are:

A
  1. Identifying and collecting documents
  2. Sorting through data by relevance
  3. Creating production sets
  4. Data management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Order of Volatility

A
  1. CPU and its cache
  2. Kernel statistics, tables and caches
  3. Memory (RAM)
  4. Temporary file systems and swap/slack space
  5. Disk drives and volumes
  6. attached removable drives
  7. Logged data to a remote location
  8. Copies of data to archived media/cloud
17
Q

SOAR (security orchestration, automation and response) can do one or more of these

A
  • Threat and vulnerability management
  • Incident response
  • Security operations automation
18
Q

Four types of SOAR automation

A
  • Defensive
  • Forensic
  • Offensive
  • Deception
19
Q

Three types of SOAR action

A
  • Enrichment
  • Esclation
  • Mitigation