Module 4 - 02-2 Flashcards

Explore incident response

1
Q

What does MDR stand for?

A

Managed detection and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is another name that Playbooks are referred to as?

A

Runbooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Choose the appropriate playbook response to address a SIEM alert.

Incident:
You’re monitoring a SIEM dashboard and receive an alert about a suspicious file download. What’s the first thing you should do?

Playbook response:
* Use a tool to contain the incident
* Assess the alert by gathering more information
* Report the alert to cyber crime agencies

A

Assess the alert by gathering more information

The first thing you should do is assess the alert to determine if it’s valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Choose the appropriate playbook response to address a SIEM alert.

Incident:
You determine that the suspicious file download alert is valid, so you follow the steps in your organization’s playbook to contain and eliminate traces of the incident. What should you do next?

Playbook response:
* Analyze log data
* Isolate the infected network system
* Restore affected systems

A

Restore affected systems

After containing and eliminating traces of the incident, you should restore affected systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Choose the appropriate playbook response to address a SIEM alert.

Incident:
After you’ve taken all the necessary steps outlined in your organization’s playbook to resolve the incident, what should you do?

Playbook response:
* Communicate the incident to stakeholders
* Investigate the suspicious file download
* Restore affected data using a clean backup

A

Communicate the incident to stakeholders

After the incident is resolved, you should perform post-incident and coordination efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Playbooks are permanent, best-practice documents, so a security team should not make changes to them.

  • True
  • False
A

False

Playbooks are living documents, so a security team will make frequent changes, updates, and improvements to address new threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A business recently experienced a security breach. Security professionals are currently restoring the affected data using a clean backup that was created before the incident. What playbook phase does this scenario describe?

  • Post-incident activity
  • Detection and analysis
  • Eradication and recovery
  • Containment
A

This scenario describes eradication and recovery. This phase involves removing the incident’s artifacts and restoring the affected environment to a secure state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Once a security incident is resolved, security analysts perform various post-incident activities and _____ efforts with the security team.

  • coordination
  • detection
  • eradication
  • preparation
A

coordination

Once a security incident is resolved, security analysts perform various post-incident activities and coordination efforts with the security team. Coordination involves reporting incidents and sharing information based on established standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which action can a security analyst take when they are assessing a SIEM alert?

  • Analyze log data and related metrics
  • Isolate an infected network system
  • Restore the affected data with a clean backup
  • Create a final report
A

An action that a security analyst can take when they are assessing a SIEM alert is to analyze log data and related metrics. This helps in identifying why the alert was generated by the SIEM tool and determining if the alert is valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly