Domain 7: Forensics and Incident Response Flashcards

1
Q

Ensures that multiple people are required to complete critical or sensitive transactions

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Provides a type of knowledge redundancy, and moving personnel around reduces the risk of fraud, data modification, theft, sabotage, and misuse of information

A

Rotation of duties/Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Requires employees to be away from work used to detect and deter fraud, or negligence

A

Mandatory leave/forced vacation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Contractual agreement requiring an individual or organization not to discuss sensitive information pertaining to the company

A

Nondisclosure agreement (NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Portions of disk partition that are marked as actively containing data

A

Allocated space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Portions of disk partition that does not contain active data
  • i.e. file is deleted the portion of the disk that held the deleted file
A

Unallocated space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The leftover space inside a cluster

A

Slack space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Disk space that cannot be used generally due to some physical defect
  • When marked OS ignores these sections
  • Attackers will mark these sections in order to hide data within the portion of disk
A

“Bad” blocks/clusters/sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Logs can contain info about visited websites

- Server can be configured to block access to certain websites

A

Proxy logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logs that track source and destination IP addresses and ports of network traffic

A

Firewall Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logs that monitor when a user accesses, modifies, or deletes a file or folder

A

Security logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Logs that monitor computer, and OS events.

- i.e. computer or service stops and starts

A

System logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An individual or group who are responsible for a threat that exploits a give vulnerability

A

Threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Another name for a hypervisor

A

Virtual Machine Monitor (VMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Pre-trial routine of attorney’s on both sides exchanging evidence
  • With this term we focus on electronic stored info (ESI) - i.e. emails, text messages, word processing documents, social media posts etc.
A

Electronic Discovery (eDiscovery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the 8 stages for the incident response methodology

A
  1. Preparation
  2. Detection (identification)
  3. Response (containment)
  4. Mitigation (eradication)
  5. Reporting
  6. Recovery
  7. Remediation
  8. Lessons learned (post incident activity, postmortem, or reporting)
17
Q
  • Incident Response methodology
  • Steps taken before an incident occurs
  • i.e. training, writing incident response policies and procedures etc.
A

Preparation

18
Q
  • Incident Response methodology

- Events are analyzed in order to determine whether these events might compromise a security incident

A

Detection (identification)

19
Q
  • Incident Response methodology
  • Incident Response team interacts with the affected systems and attempts to keep further damage from occurring as a result of the incident.
  • i.e. power off system, isolating traffic
A

Response (containment)

20
Q
  • Incident Response methodology

- In this process we understand the cause of the incident

A

Mitigation (eradication)

21
Q
  • Incident Response methodology
  • Occurs throughout the entire incident response process
  • Explanation of the incident that from both a technical and nontechnical perspective
A

Reporting

22
Q
  • Incident Response methodology

- The process of restoring the systems or systems to operational status

A

Recovery

23
Q
  • Incident Response methodology

- At this stage vulnerabilities impacting the affected systems are addressed and mitigated

A

Remediation

24
Q
  • Incident Response methodology
  • Final report on incident that will be delivered to management
  • Ways the compromise could have been identified sooner
A

Lessons learned (post incident activity, postmortem, or reporting)

25
Q

The vulnerability or weakness that allowed the incident to be realized

A

Root-Cause Analysis

26
Q
  • When detected an attacker is automatically moved here

- Simulated network environment but attacker is unable to access any confidential data from inside

A

Padded cells

27
Q
  • Are false vulnerabilities intentionally implanted in a system in an attempt to tempt attackers
  • Often used in honeypots to emulate well-known OS vulnerabilities
A

Pseudo flaws

28
Q
  • Record created by recording info about events and occurrences
  • Used to reconstruct an event, extract info about an incident, and to prove or disprove culpability
A

Audit trails

29
Q

Process of extracting elements from a large body of data to construct a meaningful representation or summary of the whole

A

Sampling aka data extraction

30
Q
  • Uses precise mathematical functions to extract meaningful info from a large volume of data
    Identify the margin of error
  • i.e. Used by pollsters to learn opinions of large populations without interviewing everyone in the population
A

Statistical sampling