04 Incident Response Flashcards

(15 cards)

1
Q

What is Incident Response?

A

The process by which a Cyber Incident Response Team (CIRT) handles security breaches, malware, and other critical cyber incidents, coordinating technical, HR, PR, legal, and recovery efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CIRT stand for and who’s on it?

A

Cyber Incident Response Team—includes technical experts plus HR, PR, legal, and disaster-recovery professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why must defenders always be vigilant?

A

Because attackers only need to succeed once, whereas defenders must prevent every attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is preparedness key in incident response?

A

Because cyber incidents are inevitable, not optional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a “Security Breach” threat type.

A

An incident caused by weak security measures or limited coverage, allowing unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a “Cyber Attack” threat type.

A

Exploitation of systems/devices via networks to compromise confidentiality, integrity, availability, or authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are “Untested Applications” a threat?

A

They may contain unknown bugs or misconfigurations that attackers can exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are “Old Version Systems” targeted?

A

Because they often lack the latest patches, making known exploits effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s an “Exploitable Vulnerability”?

A

A weakness in security controls that an attacker can leverage to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the first phase of the Incident Response workflow?

A

Preparation—create policies, define CIRT, develop response plan, set access controls, prepare tools, and conduct training/checklists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens during the Identification phase?

A

Detect and confirm incidents via logs, firewalls, IDS/IPS; determine scope, impact, origin, and affected systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three sub-steps of Containment?

A

Short-term isolation of affected files, forensic snapshots (backup), and long-term removal of backdoors/accounts and patching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Eradication in the workflow?

A

Fully removing threats—often via reimaging systems and patching—then rescanning to confirm elimination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the goal of the Recovery phase?

A

Safely restore systems to operation and monitor/test to ensure integrity and normal function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is involved in the Lessons Learned phase?

A

Conducting a postmortem, root-cause analysis, updating documentation, and adjusting training and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly