Writing Assignment: Module 06 Flashcards

1
Q

From the perspective of incident response, what is an event?

A

Any observable system or network occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an incident candidate?

A

A potential incident or ambiguously identified attack that could be an actual attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the cyber kill chain?

A

1.Reconnaissance
2.Intrusion
3.Exploitation
4.Privilege Escalation
5.Lateral Movement
6.Obfuscation / Anti-forensics
7.Denial of Service
8.Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the TCP/IP protocol, what is a port?

A

A port is a number used to uniquely identify a transaction over a network by specifying both the host and the service.

Port numbers range from 0 to 65535.
Well known ports are 0-1023,
Registered ports are 1024-49151
Dynamic ports or Private ports are from 49152-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three broad categories of incident indicators?

A

Possible, probable and definite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four categories of events that are considered possible indicators of actual incidents?

A
  1. Presence of unfamiliar files
    Unfamiliar or unexplained files in illogical locations
  2. Presence or execution of unknown programs or processes
    Unfamiliar programs running, or processes executing
  3. Unusual consumption of computing resources
    Memory or hard disk consumption spikes and falls
  4. Unusual system crashes
    System crashing, hanging, rebooting, or freezing more frequently than usual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four types of events that are considered probable indicators of actual incidents?

A
  1. Activities at unexpected times
    Network traffic levels exceed baseline levels
  2. Presence of unexpected new accounts
    Periodic review indicates unfamiliar accounts
    Unlogged new account with root or special privileges
  3. Reported attacks
    Verify user technical sophistication
  4. Notification from IDPS
    Must determine if notification real or a false positive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five types of events that are considered definite indicators of actual incidents?

A
  1. Use of dormant accounts
  2. Changes to logs
  3. Presence of hacker tools
  4. Notifications by partner or peer
  5. Notification by hacker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The occurrences of what general types of events indicate that an actual incident is occurring?

A

-loss of availability
-loss of integrity
-loss of confidentiality
-violation of policy
-violation of law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a false positive?

A

a test result which incorrectly indicates that a particular condition or attribute is present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is noise? Is noise different from a false positive event?

A

Noise: legitimate activities wrongly reported
-Activate feedback process to prevent flagging
-Inherent in the nature of best-tuned systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the general causes of noise?

A

Sensor placement; policy; lack of awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is tuning?

A

Tuning is a combination of reducing false positives, working with alerts, and correlating events and trends to ensure greater accuracy. Each of these helps the analyst by refining alerts being looked into.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a false negative?

A

normal user detected as a new user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a computer process?

A

is a set of instructions, A set of memory, A list of allocated, A list of attributes, and A table that identifies the current context of the various parts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a computer service?

A

Computer processes are often performed at the same time that the computer system.

17
Q

What is the most effective way to stop phishing attacks?

A

the SETA program

18
Q

What is business e-mail compromise (BEC)?

A

In a BEC scam, criminals send an email message that appears to come from a known source making a legitimate request

19
Q

What is data exfiltration?

A

data exfiltration is a form of a security breach that occurs when an individual’s or company’s data is copied, transferred,

20
Q

What general approach is recommended to distinguish real incidents from false positive events?

A

The general approach to narrowing the list of incident candidates and thereby detect incidents includes these steps: collect incident candidates using well-documented procedures, investigate the candidates using systems and methods at your disposal, and if a candidate is determined to be other than an authorized activity, immediately initiate your intrusion response procedures.

21
Q

What activities go into a complete log management approach?

A

To be effective, logs must first be enabled. Then, you protect the logs by the hardening the servers that create and store logs. Finally, you manage the logs.