(6) Sound the Alarm: Detection and Response Flashcards
The first phase of the NIST Incident Response Lifecycle is Preparation. What are the other phases? Select three answers.
Detection and Analysis
Post-Incident Activity
Identify
Containment, Eradication, and Recovery
Detection and Analysis
Post-Incident Activity
Containment, Eradication, and Recovery
What type of process is the NIST Incident Response Lifecycle?
Cyclical
Linear
Synchronous
Observable
Cyclical
Fill in the blank: An _____ is an observable occurrence on a network, system, or device.
investigation
analysis
incident
event
event
A security professional investigates an incident. Their goal is to gain information about the 5 W’s, which include what happened and why. What are the other W’s? Select three answers.
Where the incident took place
When the incident took place
Which type of incident it was
Who triggered the incident
Where the incident took place
When the incident took place
Who triggered the incident
What are the goals of a computer security incident response team (CSIRT)? Select three answers.
To handle the public disclosure of an incident
To manage incidents
To prevent future incidents from occurring
To provide services and resources for response and recovery
To manage incidents
To prevent future incidents from occurring
To provide services and resources for response and recovery
Which document outlines the procedures to follow after an organization experiences a ransomware attack?
A security policy
A network diagram
A contact list
An incident response plan
An incident response plan
Fill in the blank: The job of _____ is to investigate alerts and determine whether an incident has occurred.
technical leads
public relations representative
incident coordinators
security analysts
security analysts
Which member of a CSIRT is responsible for tracking and managing the activities of all teams involved in the response process?
Public relations representative
Incident coordinator
Security analyst
Technical lead
Incident coordinator
What are some examples of types of documentation? Select three answers.
Alert notifications
Final reports
Policies
Playbooks
Final reports
Policies
Playbooks
Fill in the blank: Ticketing systems such as _____ can be used to document and track incidents.
Excel
Jira
Evernote
Cameras
Jira
What application monitors system activity, then produces alerts about possible intrusions?
Intrusion detection system
Playbook
Word processor
Product manual
Intrusion detection system
What actions does an intrusion prevention system (IPS) perform? Select three answers.
Detect abnormal activity
Stop intrusive activity
Manage security incidents
Monitor activity
Detect abnormal activity
Stop intrusive activity
Monitor activity
Which tool collects and analyzes log data to monitor critical activities in an organization?
Security information and event management (SIEM) tool
Intrusion prevention system (IPS) tool
Playbook
Intrusion detection system (IDS) tool
Security information and event management (SIEM) tool
Fill in the blank: Security orchestration, automation, and response (SOAR) is a collection of applications, tools, and workflows that uses automation to _____ security events.
respond to
interact with
collect
remediate
respond to
Which step in the SIEM process transforms raw data to create consistent log records?
Normalize data
Collect and aggregate data
Analyze data
Centralize data
Normalize data
What is the process of gathering data from different sources and putting it in one centralized place?
Aggregation
Notification
Analysis
Normalization
Aggregation
Which of the following is an example of a security incident?
An unauthorized user successfully changes the password of an account that does not belong to them.
A user installs a device on their computer that is allowed by an organization’s policy.
An authorized user successfully logs in to an account using their credentials and multi-factor authentication.
A software bug causes an application to crash.
An unauthorized user successfully changes the password of an account that does not belong to them.
What process is used to provide a blueprint for effective incident response?
The NIST Incident Response Lifecycle
The incident handler’s journal
The 5 W’s of an incident
The NIST Cybersecurity Framework
The NIST Incident Response Lifecycle
Which step does the NIST Incident Response Lifecycle begin with?
Preparation
Containment, Eradication and Recovery
Post-Incident Activity
Detection and Analysis
Preparation
What is a computer security incident response team (CSIRT)?
A specialized group of security professionals who focus on incident prevention
A specialized group of security professionals who are trained in incident management and response
A specialized group of security professionals who are solely dedicated to crisis management
A specialized group of security professionals who work in isolation from other departments
A specialized group of security professionals who are trained in incident management and response
Fill in the blank: Incident response plans outline the _____ to take in each step of incident response.
instructions
exercises
policies
procedures
procedures
Which of the following best describes how security analysts use security tools?
They only use documentation tools for incident response tasks.
They only use detection and management tools during incident investigations.
They only use a single tool to monitor, detect, and analyze events.
They use a combination of different tools for various tasks.
They use a combination of different tools for various tasks.
Which statement most accurately describes documentation?
It is a standardized format used to record information across all industries.
It can be audio, video, or written instructions used for a specific purpose.
It serves as legal documentation and evidence in official settings.
It is always digital and stored in a centralized database.
It can be audio, video, or written instructions used for a specific purpose.
Fill in the blank: An intrusion detection system (IDS) _____ system activity and alerts on possible intrusions.
protects
manages
analyzes
monitors
monitors