4.0 Respond Flashcards

(86 cards)

1
Q

Incident response plans and processes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Communication with internal and external stakeholders

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Personnel role and responsibilities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Incident reporting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allow list/block list

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS/IPS rules configuration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network segmentation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web content filtering

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port blocking

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS/IPS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web proxy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anti-malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Endpoint security solutions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DLP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Windows tools to analyze incidents

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Registry

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

File system

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Processes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Services

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Volatile memory

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Active Directory tools

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Linux- based tools to analyze incidents
26
Network
27
File system
28
Malware
29
Processes
30
Volatile memory
31
Session management
32
Digital evidence collection
33
Physical evidence collection
34
Chain of custody
35
Static analysis
36
Dynamic analysis
37
FTK
38
EnCase
39
eDiscovery
40
Forensic Explorer
41
Kali Linux Forensic Mode
42
CAINE
43
SANS SIFT
44
Volatility
45
Binalyze AIR
46
Forensically sound duplicates
47
Document and communicate results
48
Logs
49
Data analysis
50
Intrusion prevention or detection systems (IDS/IPS)
51
Forensic Analysis
52
Correlation Analysis
53
Event correlation tools and techniques
54
Root cause analysis
55
Alerting systems
56
Incident reports
57
Document and communicate results
58
Chain of command
59
Policies
60
Procedures
61
Incident response plan
62
Security configuration controls
63
Baseline configurations
64
Hardening documentation
65
Document measures implemented
66
Threat actors
67
Patterns of activity
68
Methods
69
Tactics
70
Early stages of campaign
71
Key facts of the infrastructure
72
Artifacts and tools used
73
Techniques
74
Technological
75
Non-technological
76
Procedures
77
Communication policies and procedures
78
Internal communication methods
79
Secure channels
80
Out-of-band communications
81
Local law enforcement
82
Stockholders
83
Breach victims
84
Media
85
Other CERTS/CSIRTS
86
Vendors