Week 7 Flashcards
How are occurrences identified?
By comparing abnormal activities to establish baseline and thresholds of known good system performance and operation
What is collection?
The identification, labeling, recording, and acquisition of data for the possible sources of relevant data
2 ways that an incident can be classified:
- Precursors
- Indicators
What port is SSH
22
What are common sources that can facilitate the identification of precursors and indicators?
- antivirus software
- people from within
What are the main objectives within incident response?
- resolving the incident according to official requirements
- mitigating the risk or threat
- restoring integrity of affected system
- implementation of proactive and reactive defensive and productive measures
What incident categories must be sanitized and rebuilt from trusted media?
1,2, or 7
Who will make the block determination and provide guidance to the affected commands?
NCDOC
Incidents of what category would potentially trigger gateway blocks?
1, 2, 3, 4, 6, 7
The implementation of NCDOC IP black lists and DNS Black Holes Lists are mandatory.
True
Who is responsible for Tier 2?
NCDOC
Who serves as the principal advisor and representative to the CO in matters pertaining to the ES?
CSM
What is volatile data?
Data on a live system that will be lost when the system is rebooted or powered off
What’s the system state command used for user accounts?
Net user
Verifying data integrity is accomplished by?
Creating a message digest hash such as MD5 or SHA1
What can the working copy be used for?
Search for the evidence and to perform any required analysis of the data without the risk of affecting the original data or the master copy
Our networks are configured to a level of risk that can be deemed acceptable
True
What is static analysis?
The process of examining and interpreting the contents of the malware sample without executing the file
What are the abnormal combinations of seemingly uninteresting events?
- an unrecognized connection to a web server
- an unrecognized configuration change
- an unrecognized user creation or privilege escalation
What is one of the primary objectives for post-incident analysis?
Identifying technical or operational training needs
What is the response we use for the increase in security events?
Operation rolling tide
What is data compromise?
The compromise or probably compromise of classified information