Section 12: Dealing with Incident Response Procedures Flashcards

1
Q

What RAID model has a minimum of three disks? How many disks can it afford to lose?

A

RAID 5. It can afford to lose one disk without losing data. It has single parity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What RAID models has a minimum of four disks? How many disks can it afford to lose?

A

RAID 6. It can afford to lose two disks as it has double parity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between RAID 5 and RAID 6?

A

RAID 5 has single parity and can lose one disk.
RAID 6 has double parity and can lose two disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where will a diskless virtual host access its storage?

A

Storage Area Network (SAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What types of disks does a SAN use?

A

Fast disks, such as SSDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a example of cloud storage available to a personal user?

A

iCloud, Google Drive, Microsoft OneDrive, Dropbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At what stage of incident response procedures would you reduce the services running on a computer on a domain controller that is infected with malware?

A

Eradication: the removal of viruses and reduction of the services being used. The domain controller should be isolated, and this is the containment phase. The virus would be removed in the eradication phase, and then be placed back online. This is the recovery phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

During a disaster recovery exercise, the IRP team is given a scenario to respond to. What type of exercise are they likely to carry out?

A

A simulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why would a cybersecurity team use the MITRE ATT&CK Framework?

A

This is an aid to help prepare your business against different adversaries. You can drill down from an adversary into the tactics and techniques that they use. You can take mitigation steps to avoid being attacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the four key elements of the Diamond Model of Intrusion Analysis framework?

A
  1. Adversary
  2. Capabilities
  3. Infrastructure
  4. Victims
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are the roles and responsibilities of the IRP team important?

A

If they understand the roles and responsibilities, it can make them more effective when a disaster happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of file is created when your computer suffers a blue screen of death?

A

The contents of memory are saved in a dump (.dmp) file which can be used to investigate the event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of SFlow?

A

Gives you clear visibility of network traffic patterns and can identify malicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of HTTP status code lets you know you have made a successful connection to a web server?

A

200.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a SOAR system playbook?

A

Playbooks contain a set of rules to enable the SOAR to identify events and take preventative action as an event occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the benefit of network card teaming?

A

Helps load balance the network traffic and provide redundancy if one card fails.

17
Q

What is the purpose of a UPS?

A

UPS is a battery that is a standby device so that when the computer power fails, it kicks in. It is designed to keep the system going for a few minutes to allow the server team to close the servers down gracefully. It can also be used to clean up the power coming form the Notional Grid, such as spikes, surges, and voltage fluctuations.

18
Q

What can be installed on a node of a SAN to provide redundancy?

A

Two Host Bus Adapters (HBA) on each node will give two separate paths to them.

19
Q

Why would a company use two different vendors for their broadband?

A

To provide diversity so that if one vendor had a disaster, the other would keep providing the broadband.

20
Q

What is the purpose of an incident response plan?

A

It is written for a particular incident and lays out how it should be tackled and the key personnel required.

21
Q

Name three different categories of incident.

A
  1. Unauthorized access
  2. Loss of computers or data
  3. Loss of availability
  4. Malware attack
  5. DDoS attack
  6. Power failure
  7. Natural disaster (flood, tornadoes, hurricanes, fires)
  8. Cybersecurity incidents
22
Q

Name three different roles required to deal with an incident.

A
  1. Incident response manager: A top-level manager takes charge
  2. Security analyst: Provides technical support for the incident
  3. IT auditor: Checks that the company is compliant
  4. Risk analyst: Evaluates all aspects of risk
  5. HR: Sometimes, employees are involved in the incident
  6. Legal: Gives advice and makes decisions on legal issues
  7. Public relations: Deals with the press to reduce the impact on the company’s reputation
23
Q

What should the help desk do when an incident has just been reported?

A

Identify the incident response plan required and the key personnel that needs to be notified.

24
Q

What is the purpose of an incident response exercise?

A

To practice carrying out the incident response plan and identify any shortfalls.

25
Q

What is the first phase of the incident response process and what happens there?

A

Preparation phase, where the plan is already written in advance of any attack.

26
Q

What is the last phase of the incident response process?

A

Lessons learned, where we review why the incident was successful. This information gathered will prevent the incident from reoccurring.

27
Q

What would happen if the last process of the incident response process was not carried out?

A

The incident may re-occur. Lessons learned is a detective control wherein we try to identify and address any weaknesses.

28
Q

What happens during the containment phase of the disaster recovery process?

A

Isolate or quarantine an infected machine. You will also disable any account used in an attack.

29
Q

What happens during the eradication phase of the disaster recovery process?

A

We remove malware and turn off services that we do not need.

30
Q

What happens during the recovery phase of the disaster recovery process?

A

We put infected machines back online, restore data, or reimage desktops.