Operations and Incident Response Flashcards
You’re conducting a network security assessment and need to identify the actions typically taken during the “Containment” phase of incident response. What are common measures in this phase?
A) restoring affected systems to their original state, eliminating vulnerabilities
B) preventing the incident from spreading and causing further damage
C) documenting incident details and findings for future reference
D) identifying vulnerabilities and weaknesses in the system
Preventing the incident from spreading and causing further damage
During the “Containment” phase, the primary objective is to prevent the incident from spreading and causing more harm. This involves isolating affected systems or networks to limit the impact and prevent the situation from worsening.
A security analyst responding to a security incident involving unauthorized access to sensitive data. What is a common step during the “Eradication and Recovery” phase of incident response?
A) isolating affected systems and preventing the incident from spreading
B) documenting findings and actions taken for future reference
C) restoring affected systems to a secure state and implementing security updates
D) investigating the root cause of the incident and identifying gaps in security protocols
Restoring affected systems to a secure state and implementing security updates
The “Eradication and Recovery” phase involves restoring affected systems to a secure state by removing malware, applying security updates, and ensuring systems are secure and functional.
An organization experiences a data breach, and you’re part of the incident response team. What should be a priority during the “Lessons Learned” phase?
A) implementing additional security measures to prevent future incidents
B) identifying the intruder and reporting the breach to law enforcement
C) documenting the incident details and the actions taken for future reference
D) restoring affected systems and data to their original state
Documenting the incident details and the actions taken for future reference
During the “Lessons Learned” phase, it’s crucial to document incident details, actions taken, and their outcomes. This documentation helps improve future incident response strategies and training.
An organization encountered a significant Distributed Denial of Service (DDoS) attack. What is a key task during the “Preparation” phase of incident response planning?
A) detecting and analyzing the specifics of the ongoing attack
B) educating employees about common security threats and incident reporting procedures
C) isolating affected systems to contain the spread of the attack
D) restoring affected systems and implementing security updates
Educating employees about common security threats and incident reporting procedures
During the “Preparation” phase, educating employees about common security threats and incident reporting procedures is crucial for building a proactive security culture within the organization.
A company experiences a ransomware attack on its network. What is a significant action during the “Containment” phase of incident response for this scenario?
A) notifying regulatory bodies and affected shareholders
B) disconnecting affected systems from the network to prevent future encryption
C) documenting the attack details for post-incident analysis
D) conducting a comprehensive system-wide audit to identify the affected areas
disconnecting affected systems from the network to prevent future encryption
During the “Containment” phase in a ransomware attack, disconnecting affected systems from the network is crucial to halt the spread of encryption to other systems, limiting the damage.
A data breach incident occurred within an organization. What is an essential step during the “Lessons Learned” phase of incident response for this scenario?
A) identifying weaknesses in the incident response plan for immediate rectification
B) reporting the incident to law enforcement for further investigation
C) collecting evidence for potential legal actions against the perpetrators
D) documenting the shortcomings, actions, and improvements for future incident response
Documenting the shortcomings, actions, and improvements for future incident response
During the “Lessons Learned” phase, documenting the weaknesses, actions taken, and improvements for future incident responses is crucial for developing better strategies.
During a network security incident, what is an immediate task during the “Identification” phase of incident response?
A) disconnecting the affected systems from the network
B) implementing additional security measures to prevent further incidents
C) analyzing logs and traffic patterns to understand the incident’s nature
D) notifying company management and affected shareholders about the incident
Analyzing logs and traffic patterns to understand the incident’s nature
During the “Identification” phase, analyzing logs and traffic patterns is crucial to understand the nature and scope of the incident.
An organization suspects an insider threat. What is a vital step during the “Identification” phase of incident response for this situation?
A) notifying law enforcement for immediate investigation
B) conducting a comprehensive audit of user access logs and privileges
C) disabling network connectivity to prevent further potential damage
D) implementing new security protocols to prevent similar incidents
Conducting a comprehensive audit of user access logs and privileges
During the “Identification” phase for an insider threat, conducting a comprehensive audit of user access logs and privileges is crucial to identify unusual or suspicious activities within the network.
A company is addressing a significant breach in their database systems. What is an essential action during the “Containment” phase of incident response in this situation?
A) isolating affected systems and preventing the incident from spreading
B) informing the media and public about the breach for transparency
C) conducting a detailed investigation to identify the root cause
D) enhancing the system’s security through new firewalls and protocols
Isolating affected systems and preventing the incident from spreading
During the “Containment” phase, isolating affected systems is crucial to prevent the spread of the incident to other parts of the network and limit the damage.
An organization experiences a malware outbreak across its network. What should be a priority during the “Eradication and Recovery” phase of incident response in this scenario?
A) disconnecting affected systems from network
B) investigating the source of the malware and tracing its propagation
C) restoring affected systems to a clean and secure state
D) enhancing employee awareness of cybersecurity best practices
Restoring affected systems to a clean and secure state
During the “Eradication and Recovery” phase, restoring affected systems to a clean and secure state is a priority to eliminate the malware and return systems to normal functionality.
A system outage occurred due to a cyber attack. What is a crucial action during the “Lessons Learned” phase of incident response in this case?
A) filing lawsuits against identified attackers for damages
B) documenting the incident details, responses, and areas for improvement
C) implementing immediate measures to counter future cyber attacks
D) publicly announcing the incident to rebuild customer trust and confidence
Documenting the incident details, responses, and areas for improvement
During the “Lessons Learned” phase, documenting incident details and responses, and identifying areas for improvement is crucial for future incident response improvement.
A network administrator wants to map the network topology and identify active hosts and their connections. Which tool would be most suitable for this purpose?
A) tracert/traceroute
B) nslookup/dig
C) Nmap
D) ipconfig/ifconfig
Nmap
nmap (Network Mapper) is a powerful tool used for network discovery and security auditing. It scans networks, identifies active hosts, their services, and can provide information about open ports, OS detection, etc. It’s commonly used for mapping network topology.
A system administrator needs to analyze the route a packet takes to reach a specific server and identify any network delays. What tool should be utilized for this task?
A) ping/pathping
B) hping
C)netstat
D)netcat
Ping/pathping
The ping command, and its extended version pathping in Windows, is used to test connectivity and measure round-trip times between the source and a destination. It helps identify delays and packet loss on the network route.
A security analyst needs to perform a detailed examination of network packets, including crafting and sending custom packets to analyze network security. What tool best facilitates this analysis?
A) Wireshark
B) Metasploit
C) Cain and Abel
D) snort
Metasploit
Metasploit is an exploitation framework widely used for penetration testing and ethical hacking. It allows security researchers to create, test, and execute various exploits, payloads, and post-exploitation modules.
An IT administrator wants to test the strength of various passwords stored within the company’s database. What type of tool would be best for this task?
A) Wireshark
B) John the ripper
C) Nmap
D) snort
John the Ripper
John the Ripper is a well-known password-cracking tool used for testing and evaluating the strength of passwords stored within databases by employing various techniques like dictionary attacks, brute force, etc.
A data security officer needs to completely sanitize sensitive information from a retired hard drive, ensuring that no data is recoverable. What process would be ideal for this task?
A) encryption
B) disk wiping
C) file shredding
D) network segmentation
Disk wiping
Disk wiping involves overwriting data on a hard drive, making it nearly impossible to recover the data. It ensures sensitive information cannot be retrieved from the retired hardware.