Sound the Alarm: Detection and Response Flashcards

1
Q

Computer Security Incident Response Team (CSIRT)

A

A specialized group of security professionals that are trained in incident management and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Documentation

A

Any form of recorded content that is used for a specific purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Endpoint Detection and Response (EDR)

A

An application that monitors an endpoint for malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Event

A

An observable occurrence on a network, system, or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

False negative

A

A state where the presence of a threat is not detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

False positive

A

An alert that incorrectly detects the presence of a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident

A

An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Incident handler’s journal

A

A form of documentation used in incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incident response plan

A

A document that outlines the procedures to take in each step of incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST Incident Response Lifecycle

A

A framework for incident response consisting of four phases: Preparation; Detection and Analysis; Containment, Eradication, and Recovery; and Post-incident activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Operations Center (SOC)

A

An organizational unit dedicated to monitoring networks, systems, and devices for security threats or attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Orchestration, Automation, and Response (SOAR)

A

A collection of applications, tools, and workflows that uses automation to respond to security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True negative

A

A state where there is no detection of malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True positive

A

An alert that correctly detects the presence of an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Command

A

An objective of CSIRT. Refers to having the appropriate leadership and direction to oversee the response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Control

A

An objective of CSIRT. Refers to the ability to manage technical aspects during incident response, like coordinating resources and assigning tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Communication

A

An objective of CSIRT. Refers to the ability to keep stakeholders informed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Security analyst, Technical lead, and Incident coordinator

A

What are the three key security related roles under CSIRT?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security analyst

A

This job title’s role is to continuously monitor an environment for any security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Forensic investigator

A

This job title is commonly L2s and L3s (under CSIRT) who collect, preserve, and analyze digital evidence related to security incidents to determine what happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Threat hunter

A

This job title is typically L3s (under CSIRT) who work to detect, analyze, and defend against new and advanced cybersecurity threats using threat intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Endpoint

A

Any device connected on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Log analysis

A

The process of examining logs to identify events of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Command and control (C2)

A

The techniques used by malicious actors to maintain communications with compromised systems.

C2 is crucial in managing compromised devices during a cyber attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Command-line interface (CLI).

A

A text-based user interface that uses commands to interact with the computer.

CLI is often preferred for scripting and automation tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Data exfiltration

A

Unauthorized transmission of data from a system.

Data exfiltration can lead to data breaches and loss of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Indicators of compromise (IoC)

A

Observable evidence that suggests signs of a potential security incident.

IoCs can include unusual network traffic, changes in file integrity, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Network data

A

The data that’s transmitted between devices on a network.

Network data encompasses all forms of digital communication over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Network traffic

A

The amount of data that moves across a network.

Network traffic can be measured in terms of bandwidth usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Network Interface Card (NIC)

A

Hardware that connects computers to a network.

NICs can be wired or wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Packet capture (p-cap)

A

A file containing data packets intercepted from an interface or network.

P-cap files are often used for analysis in tools like Wireshark.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

tcpdump

A

A command-line network protocol analyzer.

tcpdump is commonly used for capturing and analyzing network packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Wireshark

A

A GUI network protocol analyzer.

Wireshark provides a graphical interface for packet analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Command and control

A

What does C2 stand for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Indicators of compromise

A

What does IoC stand for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Network Interface Card

A

What does NIC stand for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Packet capture

A

What does p-cap stand for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Network operations center (NOC)

A

An organizational unit that monitors the performance of a network and responds to any network disruption, such as a network outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Network operations center

A

What does NOC stand for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Data packet

A

A basic unit of information that travels from one device to another within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Version

A

An IPv4 field. This field indicates the IP version. For an IPv4 header, IPv4 is used.

For an IPv4 header, IPv4 is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Internet Header Length (IHL) field

A

An IPv4 field. This field specifies the length of the IPv4 header including any Options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Type of Service (ToS)

A

An IPv4 field. This field provides information about packet priority for delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Total Length

A

An IPv4 field. This field specifies the total length of the entire IP packet including the header and the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Identification field

A

An IPv4 field. Packets that are too large to send are fragmented into smaller pieces. This field specifies a unique identifier for fragments of an original IP packet so that they can be reassembled once they reach their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Flags

A

An IPv4 field. This field provides information about packet fragmentation including whether the original packet has been fragmented and if there are more fragments in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Fragment Offset

A

An IPv4 field. This field is used to identify the correct sequence of fragments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Time to Live (TTL)

A

An IPv4 field. This field limits how long a packet can be circulated in a network, preventing packets from being forwarded by routers indefinitely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Protocol

A

An IPv4 field. This field specifies the protocol used for the data portion of the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Header Checksum

A

An IPv4 field. This field specifies a checksum value which is used for error-checking the header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Source Address

A

An IPv4 field. This field specifies the source address of the sender.

51
Q

Destination Address

A

An IPv4 field. This field specifies the destination address of the receiver.

52
Q

Options field

A

An IPv4 field. This field is optional and can be used to apply security options to a packet.

53
Q

Traffic Class

A

An IPv6 field. This field is similar to the IPv4 Type of Service field. The Traffic Class field provides information about the packet’s priority or class to help with packet delivery.

54
Q

Version

A

An IPv6 field. This field indicates the IP version. For an IPv6 header, IPv6 is used.

55
Q

Flow Label

A

An IPv6 field. This field identifies the packets of a flow. A flow is the sequence of packets sent from a specific source.

56
Q

Payload Length

A

An IPv6 field. This field specifies the length of the data portion of the packet.

57
Q

Next Header

A

An IPv6 field. This field indicates the type of header that follows the IPv6 header such as TCP.

58
Q

Hop Limit

A

An IPv6 field. This field is similar to the IPv4 Time to Live field. The Hop Limit limits how long a packet can travel in a network before being discarded.

59
Q

Source Address

A

An IPv6 field. This field specifies the source address of the sender.

60
Q

Destination Address

A

An IPv6 field. This field specifies the destination address of the receiver.

61
Q

Analysis

A

The investigation and validation of alerts.

62
Q

Broken chain of custody

A

Inconsistencies in the collection and logging of evidence in the chain of custody

63
Q

Business continuity plan (BCP)

A

A document that outlines the procedures to sustain business operations during and after a significant disruption.

64
Q

Chain of custody

A

The process of documenting evidence possession and control during an incident lifecycle.

65
Q

Containment

A

The act of limiting and preventing additional damage caused by an incident.

66
Q

Crowdsourcing

A

The practice of gathering information using public input and collaboration.

67
Q

Detection

A

The prompt discovery of security events.

68
Q

Eradication

A

The complete removal of the incident elements from all affected systems.

69
Q

Honeypot

A

A system or resource created as a decoy vulnerable to attacks with the purpose of attracting potential intruders.

70
Q

Final report

A

Documentation that provides a comprehensive review of an incident.

71
Q

Indicators of attack (IoA)

A

The series of observed events that indicate a real-time incident.

71
Q

Lessons learned meeting

A

A meeting that includes all involved parties after a major incident.

72
Q

Open-source intelligence (OSINT)

A

The collection and analysis of information from publicly available sources to generate usable intelligence.

73
Q

Post-incident activity

A

The process of reviewing an incident to identify areas for improvement during incident handling.

74
Q

Recovery

A

The process of returning affected systems back to normal operations.

75
Q

Resilience

A

The ability to prepare for, respond to, and recover from disruptions.

76
Q

Standards

A

References that inform how to set policies.

77
Q

Threat hunting

A

The proactive search for threats on a network.

78
Q

Threat intelligence

A

Evidence-based threat information that provides context about existing or emerging threats.

79
Q

Triage

A

The prioritizing of incidents according to their level of importance or urgency.

80
Q

VirusTotal

A

A service that allows anyone to analyze suspicious files, domains, URLs, and IP addresses for malicious content.

81
Q

What does BCP stand for?

A

Business continuity plan

82
Q

What does IoA stand for?

A

Indicators of attack

83
Q

What does OSINT stand for?

A

Open-source intelligence

84
Q

What are three common public or private threat intelligence sources?

A

Industry reports, Government advisories, and threat data feeds.

84
Q

What are different types of indicators of compromise (IoCs) found in the Pyramid of Pain?

A

Hash values, IP addresses, Domain names, Network artifacts, Host artifacts, Tools, and Tactics, techniques, and procedures (TTPs).

84
Q

What are three types of recovery sites used for site resilience?

A

Hot sites, Warm sites, and Cold sites

85
Q

What does TTP stand for?

A

Tools, and Tactics, techniques, and procedures

86
Q

Hash values

A

An IoC. They correspond to known malicious files. These are often used to provide unique references to specific samples of malware or to files involved in an intrusion.

87
Q

Domain names

A

An IoC. A web address such as www.google.com

87
Q

IP addresses

A

An IoC. An internet protocol address like 192.168.1.1

87
Q

Network artifacts

A

An IoC. Observable evidence created by malicious actors on a network. For example, information found in network protocols such as User-Agent strings.

88
Q

Host artifacts

A

An IoC. Observable evidence created by malicious actors on a host. A host is any device that’s connected on a network. For example, the name of a file created by malware.

89
Q

Tools

A

An IoC. Software that’s used by a malicious actor to achieve their goal. For example, attackers can use password cracking tools like John the Ripper to perform password attacks to gain access into an account.

90
Q

Tactics, techniques, and procedures (TTPs)

A

An IoC. This is the behavior of a malicious actor. Tactics refer to the high-level overview of the behavior. Techniques provide detailed descriptions of the behavior relating to the tactic. Procedures are highly detailed descriptions of the technique. TTPs are the hardest to detect.

91
Q

Anomaly-based analysis

A

A detection method that identifies abnormal behavior.

Used in various security applications to detect potential threats.

92
Q

Array

A

A data type that stores data in a comma-separated ordered list.

Commonly used in programming for organizing data.

93
Q

Common Event Format (CEF)

A

A log format that uses key-value pairs to structure data and identify fields and their corresponding values.

Facilitates interoperability among security products.

94
Q

Configuration file

A

A file used to configure the settings of an application.

Essential for customizing application behavior.

95
Q

Endpoint

A

Any device connected on a network.

Includes computers, mobile devices, and IoT devices.

96
Q

Endpoint Detection and Response (EDR)

A

An application that monitors an endpoint for malicious activity.

Helps in detecting, investigating, and responding to threats.

97
Q

Host-based Intrusion Detection System (HIDS)

A

An application that monitors the activity of the host on which it’s installed.

Focuses on detecting malicious activity on individual machines.

98
Q

Key-value pair

A

A set of data that represents two linked items: a key, and its corresponding value.

Fundamental in data organization and storage.

99
Q

Log Management

A

The process of collecting, storing, analyzing, and disposing of log data.

Involves ensuring logs are available for analysis and compliance.

100
Q

Logging

A

The recording of events occurring on computer systems and networks.

Essential for monitoring and security.

101
Q

Network-based Intrusion Detection System (NIDS)

A

An application that collects and monitors network traffic and network data.

Focuses on detecting threats across the entire network.

102
Q

Object

A

A data type that stores data in a comma-separated list of key-value pairs.

Commonly used in software development.

103
Q

Search Processing Language (SPL)

A

Splunk’s query language.

Used for searching and analyzing data within Splunk.

104
Q

Signature

A

A pattern that is associated with malicious activity.

Used in detection methods to identify threats.

105
Q

Signature analysis

A

A detection method used to find events of interest.

Relies on known patterns to detect threats.

106
Q

Suricata

A

An open-source intrusion detection system, intrusion prevention system, and network analysis tool.

Widely used for network security monitoring.

107
Q

Telemetry

A

The collection and transmission of data for analysis.

Important in various fields, including IT and security.

108
Q

YARA-L

A

A computer language used to create rules for searching through ingested log data.

Facilitates identification of specific patterns in logs.

109
Q

What does CEF stand for?

A

Common Event Format

110
Q

What does EDR stand for?

A

Endpoint detection and response

111
Q

What does HIDS stand for?

A

Host-based intrusion detection system

112
Q

What does SPL stand for?

A

Search Processing Language

112
Q

What does NIDS stand for?

A

Network-based intrusion detection system

112
Q

What types of logs are there?

A

Network, System, Application, Security, and Authentication.

113
Q

Network

A

A type of log. These logs are generated by network devices like firewalls, routers, or switches.

113
Q

System

A

A type of log. These logs are generated by operating systems like Chrome OS™, Windows, Linux, or macOS®.

114
Q

Application

A

A type of log. These logs are generated by software applications and contain information relating to the events occurring within the application such as a smartphone app.

115
Q

Security

A

A type of log. These logs are generated by various devices or systems such as antivirus software and intrusion detection systems. Security logs contain security-related information such as file deletion.

115
Q

Authentication

A

Authentication logs are generated whenever authentication occurs such as a successful login attempt into a computer.