section 4.2 Flashcards

1
Q

What is the incident response cycle

A

Preparation,
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some ways to prepare for a security incident

A
  • Communication methods
  • Incident handling hardware & software
  • Incident analysis resources
  • Incident mitigation software
  • Policies needed for incident handling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some challenges of detection?

A

Attackers are incoming all the time

Incidents are always complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some Incident precursors

A
Web server log: 
- vulnerability scanner 
Exploit announcement:
- Adobe Flash update
Direct threats:
- A hacking group does not like you
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an incident indicator?

A

An attack is underway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some incident indicators

A

Buffer overflow attempt

Anti-virus software identifies malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a sandbox? What can you do in the sandbox?

A

An isolated operating system

Run malware and analyze the results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the goal of recovery after an incident?

A

Get things back to normal

Remove the bad, keep the good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

During the Recovery process, name some things you would eradicate. Name some things that you want to recover

A
Eradicate
- bug
- disable breached user account
Recover
- the system
- restore from backups
- rebuild from scratch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some exercises to practice in response to an incident?

A

Tabletop exercises
Walk through
Simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some differences between Communication plan and a Disaster Recovery plan

A

Communication plan is based on getting a contact list together. A recovery plan is based on creating a comprehensive plan that should include a communication plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you implement if the disaster recovery plan does not go as planned

A

Continuity of operations planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This team will determine if an event deserves a response by receiving reviewing, and then determining a response

A

Incident response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a retention policy determine

A

Determines how much and where data should be stored. Even go as far as storing copies, versions of copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is an attack framework that determines the actions of an attacker. What is the name of this framework and what does it do

A

MITRE ATT&CK framework

  • Identify point of intrusion
  • Understand methods used to move around
  • Identify potential security techniques to block future attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What would you se the Diamond Model of Intrusion Analysis framework for

A

You would use the model to analyze and fill in the details when an adversary deploys a capability over some infrastructure