Módulo 09 - Incident Response Flashcards

1
Q

Acronym:
IR

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List:
Types of security incidents

A
  1. Employee errors [Ignorance]
  2. Insider
  3. External intrusion attempts
  4. Malicious software
  5. Commercial Espionage
  6. Denial of Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List:
Steps in the Incident Response Lifecycle

A
  1. Preparation
  2. Detection
  3. Analysis
  4. Containment
  5. Eradication
  6. Recovery
  7. Lessons learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define:
Security Incident.

A

An event or series of events resulting from a security policy violation, which may or may not adversely affect an organization’s ability to conduct business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define:
Incident Response (IR) Policy

A

A set of resources, processes, and guidelines for managing cybersecurity incidents, ensuring appropriate actions are taken during the incident lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define:
Isolation

A

Isolation limits the ability of a compromised process or application to harm the network or its assets by restricting access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define:
Containment

A

Containment is the action taken immediately after detecting and identifying an event to limit its impact, such as disconnecting a machine from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define:
Segmentation

A

Segmentation is a network design strategy that separates network sections to prevent malicious actors from pivoting within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define:
Security Orchestration, Automation, and Response (SOAR)

A

A platform that compiles security data from various endpoints and allows analysts to automate solutions for security incidents based on predefined criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define:
Runbook

A

A condition-based series of protocols used to automate security incident response processes, accelerating assessment, investigation, and mitigation.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:
Playbook

A

A checklist-style document specifying step-by-step procedures to respond to a security threat or incident, ensuring a consistent approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List:
Features of a SIEM system

A
  1. Vulnerability scan output
  2. SIEM dashboards
  3. Sensors
  4. Sensitivity
  5. Trends
  6. Alerts
  7. Correlation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define:
SIEM

A

A system combining security information management (SIM) and security event management (SEM) functions into one security management platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define:
Vulnerability Scan Output

A

The output from scanners that identify vulnerabilities across network assets and recommend remediation steps, delivered to IT admins via the SIEM dashboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define:
SIEM Dashboard

A

A customizable interface showing real-time security and network information, allowing IT teams to monitor and respond to events effectively.\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define:
Sensor (in SIEM)

A

A device or software programmed to send alerts to the SIEM based on activity at critical endpoints, services, or vulnerable locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define:
Sensitivity (in SIEM)

A

The level of sensitivity configured for sensors, customizing the data sent to the SIEM based on the organization’s specific monitoring needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define:
Trends (in SIEM)

A

Patterns of activity discovered and reported to the SIEM, used to establish baselines and help analysts identify anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define:
Alert (in SIEM)

A

A notification sent by the SIEM to inform the IT team when a parameter is outside the acceptable range, often used for 24-hour monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define:
Correlation (in SIEM)

A

The process by which SIEM software analyzes data from multiple sources, compares it to known malicious behavior, and identifies potential security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Acronym:
SIEM

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define:
Log Data

A

A critical resource for investigating security incidents, containing event message data and metadata generated by processes on network appliances and hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define:
Event Message Data

A

The specific notification or alert generated by a process, such as ‘Login failure’ or ‘Firewall rule dropped traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define:
Event Metadata

A

Information about the source and time of an event, including host/network address, process name, categorization, and priority fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define:
Syslog

A

An open format, protocol, and server software for logging event messages, used by various hosts like routers, firewalls, and Linux servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define:
PRI Code (Syslog)

A

A code in syslog messages calculated from the facility and severity level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define:
Metadata

A

Attributes of files or network activity that include information like timestamps, security attributes, permissions, and extended attributes like author or location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define:
Email Metadata

A

Information in an email header that includes sender, recipient, and originating account/IP. Security devices may add X-headers for accurate tracing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define:
Mobile Metadata

A

Data produced by internet-connected devices, including timestamps, geolocation, and activity information like emails, text messages, and app usage.

30
Q

Define:
NetFlow

A

A Cisco feature that works at layers 2-4, examining data flows or sampling sessions at intervals.

31
Q

Define:
sFlow

A

A stateless packet sampling technology that works at layers 2-7, providing quick, efficient sampling in sampling mode only.

32
Q

Define:
Web Metadata

A

Metadata generated by websites, including IP addresses, user requests, cookies, downloads, and attempts to gain unauthorized access.

33
Q

Define:
IPfix

A

A standardized protocol for internal protocol flows that integrates data directly from routers, servers, and appliances, using mediation systems for data export and collection.

34
Q

Acronym:
IPfix

A

IP Flow Information Export

35
Q

List:
Data sources for forensic investigations

A
  1. Dashboards
  2. Log data
  3. Metadata
36
Q

List:
Functions of e-discovery tools

A
  1. De-duplicate files and metadata
  2. Search (keyword and semantic)
  3. Apply tags for organization
  4. Ensure security of evidence
  5. Easely exported
37
Q

Define:
Digital forensic analysis

A

The examination of evidence from computer systems and networks to uncover relevant information, such as deleted files, timestamps, user activity, and unauthorized traffic.

38
Q

Define:
Due process (in digital forensics)

A

A principle ensuring fairness and procedural safeguards during investigations, crucial for evidence to be admissible in court.

39
Q

Define:
Legal hold

A

The preservation of information that may be relevant to a legal case, requiring suspension of routine deletion of records or logs.

40
Q

Define:
Chain of custody

A

The documentation and handling process that tracks evidence from collection to storage, ensuring its integrity and admissibility in court.

41
Q

Define:
E-discovery

A

The process of filtering relevant evidence from forensic data, organizing it for use in legal proceedings, and ensuring both parties in a trial have access.

42
Q

Define:
System memory acquisition

A

The process of creating an image of volatile data in RAM to analyze running processes, temporary file systems, registry data, and network connections.

43
Q

Define:
Data image acquisition

A

The process of capturing data from nonvolatile storage (e.g., HDDs, SSDs, USB drives) in a forensically sound manner using write blockers to prevent alteration.

44
Q

Acronym:
ESI

A

Electronically Stored Information

45
Q

List:
Secure network design concepts

A
  1. Load balancing
  2. Active/active configuration
  3. Active/passive configuration
  4. Power scheduling
  5. Virtual IP (VIP)
  6. Geographic dispersal
  7. Multipath
46
Q

List:
Redundant power options

A
  1. Uninterrupted power supply (UPS)
  2. Generator
  3. Dual supply
  4. Managed power distribution unit (PDU)
47
Q

List:
Clustering benefits

A
  1. Redundancy
  2. High availability
  3. Shared session state data
  4. Seamless failover between nodes
48
Q

Define:
Load balancing

A

A process that distributes processing among multiple nodes to optimize resource use, minimize latency, and avoid overload.

49
Q

Define:
Active/active configuration

A

A setup where two load balancers work together to distribute traffic and maximize capacity, with both nodes processing connections concurrently.

50
Q

Define:
Active/passive configuration

A

A setup where one load balancer is active, and the second is passive, ready to take over if the active one fails.

51
Q

Define:
Power scheduling

A

Configuring power redundancy to provide power during outages, preventing total loss of power in catastrophic events.

52
Q

Define:
Virtual IP (VIP)

A

An IP address not assigned to a specific endpoint, used for load balancing and redundancy, often shared between clustered nodes.

53
Q

Define:
Geographic dispersal

A

The use of multiple locations to store data, mitigating downtime due to failures at a single site.

54
Q

Define:
Multipath

A

A fault-tolerance technique that provides multiple physical paths between a CPU and a storage appliance.

55
Q

Define:
Uninterrupted power supply (UPS)

A

A stand-alone bank of batteries that ensures graceful shutdowns of network appliances during power outages.

56
Q

Define:
Application clustering

A

Provisioning fault-tolerant application services by enabling servers to share session state data, ensuring seamless user experience during server faults.

57
Q

Define:
Common Address Redundancy Protocol (CARP)

A

A redundancy protocol that allows multiple hosts to share a virtual IP and ensures failover through a heartbeat mechanism.

58
Q

Acronym:
VIP

A

Virtual IP

59
Q

Acronym:
CARP

A

Common Address Redundancy Protocol

60
Q

List:
Types of snapshots

A
  1. Virtual Machine (VM) snapshots
  2. Filesystem snapshots
  3. SAN snapshots
60
Q

List:
Critical capabilities for enterprise backup solutions

A
  1. Support for various environments (virtual, physical, and cloud)
  2. Data deduplication and compression
  3. Instant recovery and replication
  4. Ransomware protection and encryption
  5. Granular restore options
  6. Reporting, monitoring, and alerting tools
  7. Integration with virtualization platforms, cloud providers, and storage systems
61
Q

List:
Advanced data protection methods

A
  1. Remote journaling
  2. SAN replication
  3. VM replication
62
Q

Define:
Enterprise backups

A

Backup solutions designed to meet the scalability, performance, security, compliance, and disaster recovery needs of large organizations.

63
Q

Define:
Data deduplication

A

A compression technique that optimizes storage by identifying and eliminating redundant data, storing only a single copy and referencing it for duplicates.

64
Q

Define:
Backup frequency

A

The interval at which backups are performed, influenced by factors such as data volatility, regulatory requirements, and system performance.

65
Q

Define:
Snapshots

A

Point-in-time captures of a system’s state, used for data protection and recovery. Types include VM snapshots, filesystem snapshots, and SAN snapshots.

66
Q

Define:
Replication

A

The process of creating and maintaining exact copies of data across different locations or systems to ensure availability and integrity.

67
Q

Define:
Journaling

A

The recording of changes to data in a dedicated log, enabling tracking, monitoring, and recovery of data in case of crashes or inconsistencies.

68
Q

Define:
Remote journaling

A

A method of maintaining a journal of data changes at a remote location to ensure business continuity in case of local failures or disasters.

69
Q

Define:
SAN replication

A

The duplication of data from one storage area network (SAN) to another, providing redundancy and protection against failures or corruption.

70
Q

Define:
VM replication

A

The process of creating an up-to-date copy of a virtual machine on a separate host or location to ensure quick recovery during failures.

71
Q

Acronym:
SAN

A

Storage Area Network