Questions D4 Incident Response and Recovery Flashcards

1
Q

Mika wants to analyze the contents of a drive without causing any changes to the drive. What method is best suited to ensuring this?

A. Set the read‐only jumper on the drive.

B. Use a write blocker.

C. Use a read blocker.

D. Use a forensic software package.

A

B. Use a write blocker.

Explanation

A hardware write blocker can ensure that connecting or mounting the drive does not cause any changes to occur on the drive. Mika should create one or more forensic images of the original drive and then work with the copy or copies as needed. She may then opt to use forensic software, possibly including a software write blocker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Eric has access to a full suite of network monitoring tools and wants to use appropriate tools to monitor network bandwidth consumption. Which of the following is not a common method of monitoring network bandwidth usage?

A. SNMP

B. Portmon

C. Packet sniffing

D. Netflow

A

B. Portmon

Explanation

SNMP, packet sniffing, and Netflow are commonly used when monitoring bandwidth consumption. Portmon is an aging Windows tool used to monitor serial ports, not exactly the sort of tool that you’d use to monitor network bandwidth!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The senior management of Kathleen’s company is concerned about rogue devices on the network. If Kathleen wants to identify rogue devices on her wired network, which of the following solutions will quickly provide the most accurate information?

A. Discovery scan with a port scanner

B. Router and switch‐based MAC address reporting

C. Physical survey

D. Reviewing a central administration tool, such as SCCM

A

B. Router and switch‐based MAC address reporting

Explanation

If Kathleen’s company uses a management system or inventory process to capture the MAC addresses of known systems, then a MAC address report from her routers and switches will show her devices that are connected to the network but not in the inventory. She can then track down where the devices are physically connected to a switch port and investigate the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During a forensic investigation, Charles discovers that he needs to capture a virtual machine that is part of the critical operations of his company’s website. If he cannot suspend or shut down the machine for business reasons, what imaging process should he follow?

A. Perform a snapshot of the system, boot it, suspend the copied version, and copy the directory it resides in.

B. Copy the virtual disk files and then use a memory capture tool.

C. Escalate to management to get permission to suspend the system to allow a true forensic copy.

D. Use a tool like the Volatility Framework to capture the live machine completely.

A

B. Copy the virtual disk files and then use a memory capture tool.

Explanation

If business concerns override his ability to suspend the system, the best option that Charles has is to copy the virtual disk files and then use a live memory imaging tool. This will give him the best forensic copy achievable under the circumstances. Snapshotting the system and booting it will result in a loss of live memory artifacts. Escalating may be possible in some circumstances, but the scenario specifies that the system must remain online. Finally, Volatility can capture memory artifacts, but is not designed to capture a full virtual machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lauren is the IT manager for a small company and occasionally serves as the organization’s information security officer. Which of the following roles should she include as the leader of her organization’s CSIRT?

A. Her lead IT support staff technician

B. Her organization’s legal counsel

C. A third‐party IR team lead

D. She should select herself.

A

D. She should select herself.

Explanation

A CSIRT leader must have authority to direct the incident response process and should be able to act as a liaison with organizational management. While Lauren may not have deep incident response experience, she is in the right role to provide those connections and leadership. She should look at retaining third‐party experts for incidents if she needs additional skills or expertise on her IR team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Because of external factors, Eric has only a limited time period to collect an image from a workstation. If he collects only specific files of interest, what type of acquisition has he performed?

A. Logical

B. Bit‐by‐bit

C. Sparse

D. None of the above

A

A. Logical

Explanation

A logical acquisition focuses on specific files of interest, such as a specific type of file, or files from a specific location. In Eric’s case, a logical acquisition meets his needs. A sparse acquisition also collects data from unallocated space. A bit‐by‐bit acquisition is typically performed for a full drive and will take longer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As the CISO of her organization, Jennifer is working on an incident classification scheme and wants to base her design on NIST’s definitions. Which of the following options should she use to best describe a user accessing a file that they are not authorized to view?

A. An incident

B. An event

C. An adverse event

D. A security incident

A

C. An adverse event

Explanation

NIST describes events with negative consequences as adverse events. It might be tempting to immediately call this a security incident; however, this wouldn’t be classified that way until an investigation was conducted. If the user accidentally accessed the file, it would typically not change classification. Intentional or malicious access would cause the adverse event to become a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In his role as a forensic examiner, Lucas has been asked to produce forensic evidence related to a civil case. What is this process called?

A. Criminal forensics

B. eDiscovery

C. Cyber production

D. Civil tort

A

B. eDiscovery

Explanation

When forensic evidence or information is produced for a civil case, it is called eDiscovery. This type of discovery often involves massive amounts of data including email, files, text messages, and any other electronic evidence that is relevant to the case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Darcy is designing a fault‐tolerant system and wants to implement RAID level 5 for her system. What is the minimum number of physical hard disks she can use to build this system?

A. One

B. Two

C. Three

D. Five

A

C. Three

Explanation

RAID level 5, disk striping with parity, requires a minimum of three physical hard disks to operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What important function do senior managers normally fill on a business continuity planning team?

A. Arbitrating disputes about criticality

B. Evaluating the legal environment

C. Training staff

D. Designing failure controls

A

A. Arbitrating disputes about criticality

Explanation

Senior managers play several business continuity planning roles. These include setting priorities, obtaining resources, and arbitrating disputes among team members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which one of the following is not normally included in business continuity plan documentation?

A. Statement of accounts

B. Statement of importance

C. Statement of priorities

D. Statement of organizational responsibility

A

A. Statement of accounts

Explanation

Business continuity plan documentation normally includes the continuity planning goals, a statement of importance, statement of priorities, statement of organizational responsibility, statement of urgency and timing, risk assessment and risk acceptance and mitigation documentation, a vital records program, emergency response guidelines, and documentation for maintaining and testing the plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which one of the following is not normally considered a business continuity task?

A. Business impact assessment

B. Emergency response guidelines

C. Electronic vaulting

D. Vital records program

A

C. Electronic vaulting

Explanation

Electronic vaulting is a data backup task that is part of disaster recovery, not business continuity, efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who should receive initial business continuity plan training in an organization?

A. Senior executives

B. Those with specific business continuity roles

C. Everyone in the organization

D. First responders

A

C. Everyone in the organization

xplanation

Everyone in the organization should receive a basic awareness training for the business continuity program. Those with specific roles, such as first responders and senior executives, should also receive detailed, role‐specific training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which one of the following components should be included in an organization’s emergency response guidelines?

A. List of individuals who should be notified of an emergency incident

B. Long‐term business continuity protocols

C. Activation procedures for the organization’s cold sites

D. Contact information for ordering equipment

A

A. List of individuals who should be notified of an emergency incident

xplanation

The emergency response guidelines should include the immediate steps an organization should follow in response to an emergency situation. These include immediate response procedures, a list of individuals who should be notified of the emergency and secondary response procedures for first responders. They do not include long‐term actions such as activating business continuity protocols, ordering equipment, or activating DR sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which one of the following stakeholders is not typically included on a business continuity planning team?

A. Core business function leaders

B. Information technology staff

C. CEO

D. Support departments

A

C. CEO

Explanation

While senior management should be represented on the BCP team, it would be highly unusual for the CEO to fill this role personally.

16
Q

As part of his incident response process, Charles securely wipes the drive of a compromised machine and reinstalls the operating system (OS) from original media. Once he is done, he patches the machine fully and applies his organization’s security templates before reconnecting the system to the network. Almost immediately after the system is returned to service, he discovers that it has reconnected to the same botnet it was part of before. Where should Charles look for the malware that is causing this behavior?

A. The operating system partition

B. The system BIOS or firmware

C. The system memory

D. The installation media

A

B. The system BIOS or firmware

Explanation

The system Charles is remediating may have a firmware or BIOS infection, with malware resident on the system board. While uncommon, this type of malware can be difficult to find and remove. Since he used original media, it is unlikely that the malware came from the software vendor. Charles wiped the system partition, and the system would have been rebooted before being rebuilt, thus clearing system memory.

17
Q

Karen’s organization has been performing system backups for years but has not used the backups frequently. During a recent system outage, when administrators tried to restore from backups, they found that the backups had errors and could not be restored. Which of the following options should Karen avoid when selecting ways to ensure that her organization’s backups will work next time?

A. Log review

B. MTD verification

C. Hashing

D. Periodic testing

A

B. MTD verification

Explanation

Karen can’t use MTD verification because MTD is the maximum tolerable downtime. Verifying it will only tell her how long systems can be offline without significant business impact. Reviewing logs, using hashing to verify that the logs are intact, and performing periodic tests are all valid ways to verify that the backups are working properly.

18
Q

Which one of the following is not an example of a backup tape rotation scheme?

A.Grandfather/Father/Son

B. Meet‐in‐the‐middle

C. Tower of Hanoi

D. Six Cartridge Weekly

A

B. Meet‐in‐the‐middle

Explanation

The Grandfather/Father/Son, Tower of Hanoi, and Six Cartridge Weekly schemes are all different approaches to rotating backup media that balance reuse of media with data retention concerns. Meet‐in‐the‐middle is a cryptographic attack against 2DES encryption.

19
Q

Which one of the following is not a requirement for evidence to be admissible in court?

A. The evidence must be relevant.

B. The evidence must be material.

C. The evidence must be tangible.

D. The evidence must be competent.

A

C. The evidence must be tangible.

Explanation

Evidence provided in court must be relevant to determining a fact in question, material to the case at hand, and competently obtained. Evidence does not need to be tangible. Witness testimony is an example of intangible evidence that may be offered in court.

Tangible - perceptible by touch.

20
Q

Florian is building a disaster recovery plan for his organization and would like to determine the amount of time that a particular IT service may be down without causing serious damage to business operations. What variable is Florian calculating?

A. RTO

B. MTD

C. RPO

D. SLA

A

B. MTD

Explanation

The maximum tolerable downtime (MTD) is the longest amount of time that an IT service or component may be unavailable without causing serious damage to the organization.
The recovery time objective (RTO) is the amount of time expected to return an IT service or component to operation after a failure.
The recovery point objective (RPO) identifies the maximum amount of data, measured in time, that may be lost during a recovery effort.
Service‐level agreements (SLAs) are written contracts that document service expectations.

21
Q

Veronica is considering the implementation of a database recovery mechanism recommended by a consultant. In the recommended approach, an automated process will move database backups from the primary facility to an off‐site location each night. What type of database recovery technique is the consultant describing?

A. Remote journaling

B. Remote mirroring

C. Electronic vaulting

D. Transaction logging

A

C. Electronic vaulting

Explanation

In an electronic vaulting approach, automated technology moves database backups from the primary database server to a remote site on a scheduled basis, typically daily.
Transaction logging is not a recovery technique alone; it is a process for generating the logs used in remote journaling.
Remote journaling transfers transaction logs to a remote site on a more frequent basis than electronic vaulting, typically hourly.
Remote mirroring maintains a live database server at the backup site and mirrors all transactions at the primary site on the server at the backup site.

22
Q

During what phase of the incident response process do administrators take action to limit the effect or scope of an incident?

A. Detection

B. Response

C. Mitigation

D. Recovery

A

C. Mitigation

Explanation

The Mitigation phase of incident response focuses on actions that can contain the damage incurred during an incident. This includes limiting the scope and or effectiveness of the incident.

23
Q

Gordon suspects that a hacker has penetrated a system belonging to his company. The system does not contain any regulated information, andss Gordon wants to conduct an investigation on behalf of his company. He has permission from his supervisor to conduct the investigation. Which of the following statements is true?

A. Gordon is legally required to contact law enforcement before beginning the investigation.

B. Gordon may not conduct his own investigation.

C. Gordon’s investigation may include examining the contents of hard disks, network traffic, and any other systems or information belonging to the company.

D. Gordon may ethically perform “hack back” activities after identifying the perpetrator.

A

C. Gordon’s investigation may include examining the contents of hard disks, network traffic, and any other systems or information belonging to the company.

Explanation

Gordon may conduct his investigation as he wants and use any information that is legally available to him, including information and systems belonging to his employer. There is no obligation to contact law enforcement. However, Gordon may not perform “hack back” activities because those may constitute violations of the law and/or (ISC)2 Code of Ethics.

24
You are performing an investigation into a potential bot infection on your network and want to perform a forensic analysis of the information that passed between different systems on your network and those on the Internet. You believe that the information was likely encrypted. You are beginning your investigation after the activity concluded. What would be the best and easiest way to obtain the source of this information? A. Packet captures B. Netflow data C. Intrusion detection system logs D. Centralized authentication records
B. Netflow data Explanation Netflow data contains information on the source, destination, and size of all network communications and is routinely saved as a matter of normal activity. Packet capture data would provide relevant information, but it must be captured during the suspicious activity and cannot be re‐created after the fact unless the organization is already conducting 100 percent packet capture, which is rare. Additionally, the use of encryption limits the effectiveness of packet capture. Intrusion detection system logs would not likely contain relevant information because the encrypted traffic would probably not match intrusion signatures. Centralized authentication records would not contain information about network traffic.
25
In what virtualization model do full guest operating systems run on top of a virtualization platform? A. Virtual machines B. Software‐defined networking C. Virtual SAN D. Application virtualization
A. Virtual machines Explanation Virtual machines run full guest operating systems on top of a host platform known as the hypervisor.
26
What documentation is typically prepared after a postmortem review of an incident has been completed? A. A lessons learned document B. A risk assessment C. A remediation list D. A mitigation checklist
A. A lessons learned document Explanation A lessons learned document is often created and distributed to involved parties after a postmortem review to ensure that those who were involved in the incident and others who may benefit from the knowledge are aware of what they can do to prevent future issues and to improve response in the event that one occurs. **A postmortem (or post-mortem) is a process intended to help you learn from past incidents. It typically involves an analysis or discussion soon after an event has taken place. Postmortems typically involve blame-free analysis and discussion soon after an incident or event has taken place.
27
Ed has been tasked with identifying a service that will provide a low‐latency, high‐performance, and high‐availability way to host content for his employer. What type of solution should he seek out to ensure that his employer’s customers around the world can access their content quickly, easily, and reliably? A. A hot site B. A CDN C. Redundant servers D. A P2P CDN
B. A CDN Explanation A content distribution network (CDN) is designed to provide reliable, low‐latency, geographically distributed content distribution. In this scenario, a CDN is an ideal solution. A P2P CDN like BitTorrent isn’t a typical choice for a commercial entity, whereas redundant servers or a hot site can provide high availability but won’t provide the remaining requirements.
28
Who is the ideal person to approve an organization’s business continuity plan? A. Chief information officer B. Chief executive officer C. Chief information security officer D. Chief operating officer
B. Chief executive officer xplanation Although the CEO will not normally serve on a BCP team, it is best to obtain top‐level management approval for your plan to increase the likelihood of successful adoption.
29
Which one of the following actions is not normally part of the project scope and planning phase of business continuity planning? A. Structured analysis of the organization B. Review of the legal and regulatory landscape C. Creation of a BCP team D. Documentation of the plan
D. Documentation of the plan Explanation The project scope and planning phase includes four actions: a structured analysis of the organization, the creation of a BCP team, an assessment of available resources, and an analysis of the legal and regulatory landscape.
30
Henry’s company is being sued for breach of contract. What type of law will cover this? A. Civil law B. Administrative law C. Criminal law D. Ethical standards
A. Civil law Explanation Civil law covers behavior that could cause injury to a corporation, individual, or other party. Criminal law covers behavior that could cause harm to society or the state. Administrative law regulates government agencies. Ethical standards are not a type of law.
31
Which of the following is not an event that is typically prepared for in an emergency response plan? A. A supply chain disruption B. A pandemic C. A natural disaster D. A man‐made disaster
A. A supply chain disruption Explanation Supply chain disruptions are not typically considered in emergency response plans. They’re more likely to be handled through procurement processes and supplier management practices. Man‐made and natural disasters as well as pandemics are all commonly addressed in emergency response plans.
32
Miguel is preparing a crisis management process for his organization. What step will typically come after “Respond” in the following cycle? 1. Prepare 2. Respond 3. ? 4. Mitigate A. Analyze B. Recover C. Evaluate D. Identify
B. Recover Explanation Crisis management is much like other forms of incident response, and once a crisis has occurred, response and then recovery must occur. Once recovery has happened, mitigation and preparation for the next event can begin.
33
Emma’s organization is planning for natural disasters and wants to have a backup site available to move operations to. What important factor in backup site selection will help Emma avoid a single disaster disrupting operations for her organization? A. Network bandwidth B. Availability of backup power C. Geographic location D. Risk of natural disasters for the locations
C. Geographic location Explanation The most important factor when selecting backup site locations is to identify a location that is unlikely to be impacted by the same natural disaster. In many cases, this is a location 50 to 90 miles away, but other factors can come into play when selecting a site. Examples include placing backup facilities for a site that may be impacted by a hurricane inland so that a single weather event is unlikely to impact both locations. Network bandwidth, availability of backup power, and the risk of natural disasters are all factors, but geographic dispersion is the most important element to consider.