Unit 6 - Module 1 - Incident Response Flashcards

1
Q

What do you call an observable occurrence on a network, system, or device?

A

An Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a form of documentation used in incident response?

A

Incident Handler’s Journal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What incident responce process is cyclical?

A

NIST Incident Responce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do you call a specialized group of security professionals that are trained in incident management and responce?

A

Computer Security Incident Response Teams ( CSIRT )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What framework are these 4 phases?

Preparation

Detection and Analysis

Containment, Eradication, and Recovery

Post-Incident Activity

A

NIST Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 Important thing incident responce teams need?

3 C’s

A

Command

Control

Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What security responce teams usually have these 3 roles?

Security Analyst

Technical Lead

Incident Coordinator

A

CSIRT ( Computer Security Incident Responce Team )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you call a document that outlines the procedures to take in each step of incident response?

A

Incident Responce Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is any form of recorded content that is used for a specific purpose?

A

Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a manual that provides details about any operational action?

A

Playbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an application that monitors system and network activity and produces alerts on possible intrusions?

A

Intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an application that monitors system activity for intrusions and take action to stop the activity?

A

Intrusion prevention system (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you call an alert that correctly detects the presence of an attack?

A

A True Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you call a state where there is no detection of malicious activity. This is when malicious activity exists and no alert is triggered.

A

A True Negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an alert that incorrectly detects that presence of a threat? This is when an IDS identifies an activity as malicious, but it isn’t. False positives are an inconvenience for security teams because they spend time and resources investigating an illegitimate alert.

A

A False Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a state where the presence of a threat is not detected? This is when malicious activity happens but IDS fails to detect it. False negatives are dangerous because security teams are left unaware of legitimate attacks that they can vulnerable to.

A

A False Negative

17
Q

What is an application that monitors an endpoint for malicious activity? A tool that monitors, records, and analyzes endpoint system activity to identify, alert, and respond to suspicious activity.

A

End point Detection and Responce (EDR)

18
Q

What is an application that collects and analyzes log data to monitor critical activities in an organization?

A

Security Information and Event Management (SIEM)

19
Q

What tool uses these 4 steps?

Collect, Aggregate data, Normalize Data, and Analyze Data

A

SIEM Tool

20
Q

What is a collection of applications, tools, and workflows that uses automation to respond to security events?

A

Security Orchestration, Automation, and Response (SOAR)