Chapter 17 Flashcards

1
Q

What stages in the incident management steps include a root cause analysis to determine the cause and recommend solutions to prevent a reoccurrence.

A

Remediation
Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common basic preventative measures to prevent incidents from occurring?

A

Keeping systems up to date

Removing/disabling unneeded protocols and services

Using IDS and IPS

Using anti malware

Enabling firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What provide a list of approved software and prevent the installation of any other software not on the list.

A

Whitelists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What provide a list of unapproved software and prevent the installation of any software on the list.

A

Blacklists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What provides an isolated environment and prevents code running in a sandbox from interacting with elements outside of a sandbox.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a collection of compromised computing devices (often called bots or zombies) organized in a network controlled by a criminal known as a bot herder.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What attack employ an amplification network to send numerous response packets to a victim.

A

Smurf Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a system that typically has pseudo flaws and fake data to lure intruders.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is two or more honeypots in a network.

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the ways to block malicious code?

A

Anti malware software w/ up to date definitions installed

Employee education

Enforcing least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How should log files be protected ?

A

Centrally storing them and using permissions to restrict access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a form of auditing that focuses on active review of the log file data.

A

Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a passive form of detective security control, and audit trails are essential evidence in criminals’ prosecution.

A

Audit Trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the records created by recording information about events and occurrences into one or more databases or log files.

A

Audit Trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you maintain accountability ?

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the process of extracting elements from a large body of data to construct a meaningful representation or summary of the whole.

A

Sampling

17
Q

What is a form of nonstatistical sampling that records only events that exceed a threshold.

A

Clipping

18
Q

What provide organizations with a steady stream of raw data.

A

Threat Feeds

19
Q

What are the benefits of SOAR?

A

Reduces administrative workload

Reduce human error

20
Q

I am sitting on the bed

A

Je suis assis sur le lit

21
Q

You are sitting on the bed

A

Vous assistez sur le lit

22
Q

I was sitting on the bed

A

J’étais assis sur le lit

23
Q

I am going to the kitchen

A

Je vais à la cuisine

24
Q

I am standing in the kitchen

A

Je suis debout dans la cuisine