Operations and Incident Response Flashcards

1
Q

What should you identify about a user before implementing the principle of least privilege?

A

User’s job function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To provide checks and balances and to prevent one person from gaining too much power over a system, which type of security policy should you implement?

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three basic questions answered by the chain of custody?

A
  • Who controlled the evidence
  • Who secured the evidence
  • Who obtained the evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which policy should be reviewed by the security administrator to determine what data is allowed to be collected from users of the corporate Internet-facing Web application?

A

Company’s privacy policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What document lists the steps to take in case of a disaster to your main IT site?

A

Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why should a first responder be familiar with the incident response plan?

A

To ensure that the appropriate procedures are followed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the proper life cycle of evidence steps?

A

Collection, analysis, storage, court presentation, and return to owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must you do for an effective security auditing policy, besides creating security logs?

A

Analyze the logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which assessment examines whether network security practices follow a company’s security policy?

A

Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is responsible for most security incidents in an organization?

A

Employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is meant by the term legal hold?

A

A process that an organization uses to preserve all forms of relevant information when preservation is needed for litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should the proper chain of custody be ensured?

A

So that evidence will be admissible in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is wireshark?

A

A protocol analyzer or packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which policy defines the technical means that are used to protect data on a network?

A

Security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

According to the CompTIA Security+ blueprint, what are the six steps in the incident response process?

A
  1. Preparation
  2. Identification
  3. Containment
  4. Eradication
  5. Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which log in Event View should you open to view events that are generated based on your auditing settings?

A

Security log

17
Q

When evidence is seized, which principle should be emphasized?

A

Chain of custody

18
Q

What is the primary goal of business continuity planning?

A

Maintain the organization

19
Q

Which document is used when it is necessary to invoke legal action against an employee for inappropriate use of computer resources?

A

Acceptable use policy

20
Q

What is the name of the process for removing only the incriminating data from the audit logs

A

Scrubbing

21
Q

What are correlation engines

A

Applications that examine relationships between entries in firewall logs to understand possible attacks

22
Q

What is the name of the group of people appointed to respond to security incidents?

A

Incident response team

23
Q

Which security measure prevents fraud by reducing the chances of collision?

A

Separation of duties

24
Q

Which team is responsible for restoring critical business functions at an alternate site in the event of disruption?

A

Recovery team

25
Q

Which principle ensures that users are given the most restrictive user rights to complete their authorized job duties?

A

The principle of least privilege

26
Q

Which tool should you use to retrieve the contents of a FET request: a protocol analyzer or port scanner?

A

A protocol analyzer

27
Q

What is the name of the security process that involves recognition, verification, classification, containment, and analysis?

A

An incident response

28
Q

What is incident management?

A

The activities of an organization to identify, analyze, and correct risks as they are identified