Writing Assignment: Module 08 Flashcards

1
Q

What is an IR reaction strategy?

A

procedures for regaining control of systems and restoring operations to normalcy are the heart of the IR plan and the CSIRT’s operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If an organization chooses the protect and forget approach instead of the apprehend and prosecute philosophy, what aspect of IR will be most affected?

A

The aspect of IR that will be most affected is the data collection tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the first task the CSIRT leader will undertake on arrival?

A

Determine whether an incident occured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the second task the CSIRT leader will undertake?

A

Analyze precursors and indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the best thing an organization can do to make its CSIRT most effective?

A

Be prepared by having a risk assessment and good security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the first imperative of the CSIRT when there is a confirmed incident?

A

Incident Containment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why might an organization forego trying to identify the attacking host during an incident response?

A

To prevent concurrent recurrence and protect assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the phase after containment during incident response?

A

Eradicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a concurrent recurrence?

A

an incident happening while trying to solve another incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the phase after eradication during incident response?

A

Contain and Mitigate vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary determinant of which containment and eradication strategies are chosen for a specific incident?

A

●Type
●Method of incursion
●Current level of success
●Expected or projected level of success
●Current level of loss
●Expected or projected level of loss
●Target
●Target’s level of classification and/or sensitivity
●Any legal or regulatory impacts mandating a specific response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is watchful waiting and why might we use it?

A

a tactic that deliberately permits the attack to continue while the entire event is observed and additional evidence is collected. The use of this type of delayed containment may need to be previewed with legal counsel to see if it is feasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is delayed containment not recommended for most CSIRTs?

A

may increase attack intensity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a DoS attack and how does it differ from a DDoS attack?

A

the main difference between a DoS and a DDoS attack is the number of sources used to carry out the attack. A DoS attack is typically a single source, while a DDoS attack involves multiple sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the first and most important step in preparing for DoS and DDoS attack responses?

A

Coordinating with the ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is malware?

A

software designed to damage, destroy, or deny service to target systems

17
Q

What is spam? Can it cause an incident?

A

unwanted e-mail traffic and is a common carrier of malware and a source of phishing attacks.

spam can cause incidents like posing security risks if employees accidentally click on malicious links or download infected attachments, or with large volumes of spam it can cause email servers to crash.

18
Q

What is unauthorized access?

A

when an individual, an applications, or another program,through access to the operation system’s application programming interface (API), attempts to and/or gains access to an information asset without explicit permission or authorization to do so.

19
Q

What is inappropriate use?

A

is characterized as a violation of policy’s or an effort to abuse existing systems

20
Q

What is a hybrid incident?

A

begins as an IU incident, then may quickly change into a malware incident.