Section 12: Dealing with Incident Response Procedures Flashcards
What RAID model has a minimum of three disks? How many disks can it afford to lose?
RAID 5. It can afford to lose one disk without losing data. It has single parity.
What RAID models has a minimum of four disks? How many disks can it afford to lose?
RAID 6. It can afford to lose two disks as it has double parity.
What is the difference between RAID 5 and RAID 6?
RAID 5 has single parity and can lose one disk.
RAID 6 has double parity and can lose two disks.
Where will a diskless virtual host access its storage?
Storage Area Network (SAN).
What types of disks does a SAN use?
Fast disks, such as SSDs.
What is a example of cloud storage available to a personal user?
iCloud, Google Drive, Microsoft OneDrive, Dropbox
At what stage of incident response procedures would you reduce the services running on a computer on a domain controller that is infected with malware?
Eradication: the removal of viruses and reduction of the services being used. The domain controller should be isolated, and this is the containment phase. The virus would be removed in the eradication phase, and then be placed back online. This is the recovery phase.
During a disaster recovery exercise, the IRP team is given a scenario to respond to. What type of exercise are they likely to carry out?
A simulation.
Why would a cybersecurity team use the MITRE ATT&CK Framework?
This is an aid to help prepare your business against different adversaries. You can drill down from an adversary into the tactics and techniques that they use. You can take mitigation steps to avoid being attacked.
What are the four key elements of the Diamond Model of Intrusion Analysis framework?
- Adversary
- Capabilities
- Infrastructure
- Victims
Why are the roles and responsibilities of the IRP team important?
If they understand the roles and responsibilities, it can make them more effective when a disaster happens.
What type of file is created when your computer suffers a blue screen of death?
The contents of memory are saved in a dump (.dmp) file which can be used to investigate the event.
What is the purpose of SFlow?
Gives you clear visibility of network traffic patterns and can identify malicious traffic.
What type of HTTP status code lets you know you have made a successful connection to a web server?
200.
What is the purpose of a SOAR system playbook?
Playbooks contain a set of rules to enable the SOAR to identify events and take preventative action as an event occurs.