Operations and Incident Response Flashcards
What analysis framework provides the most explicit detail regarding how to mitigate or detect a given threat?
The MITRE ATT&CK framework
Explanation - The MITRE ATT&CK framework provides explicit pseudo-code examples for how to detect or mitigate a given threat within a network and ties specific behaviors back to individual actors.
What platform utilizes a well-written set of carefully developed and tested scripts to orchestrate runbooks and generate consistent server builds across an enterprise?
Infrastructure as Code (IaC)
Explanation - IaC is designed with the idea that a well-coded description of the server/network operating environment will produce consistent result across an enterprise, and significantly reduce IT overhead costs.
What should be used as a checklist of actions to perform in order to detect and respond to an ongoing spearphishing campaign against an organization?
A “Playbook” is a checklist of actions to perform to detect and respond to a specific type of incident.
What practices should be implemented to ensure that none of its computers can run a peer-to-peer file sharing program on an office environment?
Application Blacklisting
Explanation - Implementing this practice will block and limit the number of known programs.
What is the correct order for the Incident Response process?
- Preparation
- Identification
- Containment
- Eradication
- Recovery
- Lessons Learned
What action should be done FIRST after forensically imaging a hard drive for evidence in an investigation?
Create a hash digest of the source drive and the image file to ensure both match