Incident Management Flashcards
(271 cards)
To ensure the timely identification of security incidents, the BEST course of action is to:
A.document a business impact analysis.
B.review a risk analysis.
C.implement incident detection.
D.apply preventive and detective controls.
C is the correct answer.
Justification
The business impact analysis identifies and analyzes business processes and activities with the objective of understanding the impact of downtime, which drives the assignment of recovery objectives and prioritization. Downtime is a variable bound with the availability requirement in the information security scope.
Risk analysis does not ensure the timely identification of information security incidents. The incident process performance deals with timely operations. Risk analysis is mainly concerned with calculating the probability and impact of a potential risk.
Incident detection provides timely notification of an incident and could ensure the timely triggering and identification of incidents. Subsequently, implementing incident detection ensures proper incident response, reducing impacts to within acceptable levels.
Incident management is built on reactive controls because it must handle effects not manageable with preventive controls. Detective controls represent a wide range of countermeasures and do not ensure timely identification and handling of incidents.
To justify the establishment of an incident management team, an information security manager would find which of the following to be the MOST effective?
A.Assessment of business impact of past incidents
B.Need for an independent review of incident causes
C.Need for constant improvement on the security level
D.Possible business benefits from incident impact reduction
D is the correct answer.
Justification
The assessment of business impact of past incidents would need to be completed to articulate the benefits.
Having an independent review benefits the incident management process.
The need for constant improvement on the security level is a benefit to the enterprise.
Business benefits from incident impact reduction would be the most important goal for establishing an incident management team.
When properly tested, which of the following would MOST effectively support an information security manager in handling a security breach?
A.Business continuity plan
B.Disaster recovery plan
C.Incident response plan
D.Vulnerability management plan
C is the correct answer.
Justification
A business continuity plan would be triggered during the execution of the incident response plan in case it developed into a disaster causing serious business interruption.
A disaster recovery plan would be triggered during the execution of the incident response plan if it developed into a disaster.
An incident response plan documents the step-by-step process to follow, along with the related roles and responsibilities pertaining to all parties involved in responding to an information security breach.
A vulnerability management plan is a procedure to address technical vulnerabilities and mitigate the risk through configuration changes (patch management).
Which of the following measurements is integrated into the incident response plan by this statement: “If the database is corrupted by an incident, the backup at the close of work on the previous day should be restored”?
A.The recovery time objective
B.The recovery point objective
C.The service delivery objective
D.The maximum tolerable outage
B is the correct answer.
Justification
The recovery time objective (RTO) is the amount of time allowed for the recovery of a business function or resource after a disaster occurs. The statement does not mention the time for the restoration to be concluded.
The recovery point objective (RPO) is determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interruption. The statement allows for the loss of current day’s data.
Directly related to the business needs, the service delivery objective (SDO) is the level of services to be reached during the alternate process mode until the normal situation is restored. The SDO is the acceptable level of service within the RTO.
The maximum tolerable outage is the maximum time that an enterprise can support processing in alternate mode.
When establishing a new incident management team whose members will serve on a part-time basis, which of the following means of training is MOST effective?
A.Formal training
B.Mentoring
C.On-the-job training
D.Induction
A is the correct answer.
Justification
Formal training is a good choice when everyone is new because it does not assume any prior knowledge and ensures that everyone covers the same material.
Mentoring is most effective when senior members of an established team can be paired with new members. It does not work well when everyone is new.
On-the-job training is a suitable choice when the material to be learned is part of the participants’ everyday duties. For an incident management team comprised of part-time members, there will be limited opportunities to train in the course of regular, day-to-day activities.
Induction provides a basic overview of incident management team activities and serves as a basis for further training. By itself, it is not an effective means of training.
Which of the following choices includes the activity of evaluating the computing infrastructure by performing proactive security assessment and evaluation?
A.A disaster recovery plan
B.A business continuity plan
C.An incident management plan
D.A continuity of operations plan
C is the correct answer.
Justification
A disaster recovery plan is a set of human, physical, technical and procedural resources to recover, within a defined time and cost, an activity interrupted by an emergency.
A business continuity plan is a plan used by an enterprise to respond to disruption of critical business processes. It depends on the contingency plan for restoration of critical systems.
This activity is part of the protect phase of the incident management planning process flow.
A continuity of operations plan is an effort within individual executive departments and agencies to ensure that primary mission-essential functions continue to be performed during a wide range of emergencies, including localized acts of nature, accidents and technological or attack-related emergencies.
Who would be in the BEST position to determine the recovery point objective for business applications?
A.Business continuity coordinator
B.Chief operations officer
C.Information security manager
D.Internal audit
B is the correct answer.
Justification
It would be inappropriate for a business continuity coordinator to determine the recovery point objective (RPO) because that role is not directly responsible for the data or the operation.
The RPO is the processing checkpoint to which systems are recovered. In addition to data owners, the chief operations officer is the most knowledgeable person to make this decision.
It would be inappropriate for the information security manager to determine the RPO because that role is not directly responsible for the data or the operation.
It would be inappropriate for internal audit to determine the RPO because that role is not responsible for the data or the operation.
Which of the following is a key component of an incident response policy?
A.Updated call trees
B.Escalation criteria
C.Press release templates
D.Critical backup files inventory
B is the correct answer.
Justification
Call trees are too detailed, change too frequently and are not a part of policy.
Escalation criteria, indicating the circumstances under which specific actions are to be undertaken, should be contained within an incident response policy.
Press release templates are too detailed to be included in a policy document.
Lists of critical backup files are too detailed to be included in a policy document.
Addressing the root cause of an incident is one aspect of which of the following incident management processes?
A.Eradication
B.Recovery
C.Lessons learned
D.Containment
A is the correct answer.
Justification
Determining the root cause of an incident and eliminating it are key activities that occur as part of the eradication process.
Recovery focuses on restoring systems or services to conditions specified in service delivery objectives (SDOs) or business continuity plans (BCPs).
Lessons learned are documented at the end of the incident response process, after the root cause has been identified and remediated.
Containment focuses on preventing the spread of damage associated with an incident, typically while the root cause either is still unknown or is known but cannot yet be remediated.
The triage phase of the incident response plan provides:
A.a snapshot of the current status of all incident activity reported.
B.a global, high-level view of the open incidents.
C.a tactical review of an incident’s progression and resolution.
D.a comprehensive basis for changes to the enterprise architecture.
A is the correct answer.
Justification
Triage gives a snapshot based on both strategic and tactical reviews for the purposes of assigning limited resources to where they can be most effective.
Triage addresses the tactical level of the incident to be able to determine the best path to resolution and does not focus exclusively on the high-level view.
Triage provides a view of both the tactical and strategic levels and occurs prior to resolution.
Triage occurs before root-cause analysis, so it does not provide a comprehensive basis for changes to the enterprise architecture.
Which of the following would be the BEST indicator of the readiness of the incident response team in the context of the overall incident management program?
A.Amount of time for incident detection
B.Time between incident detection and severity determination
C.Time between detection and response
D.Amount of time between incident occurrence and its resolution
C is the correct answer.
Justification
The time to detect is a measure of detection capability, which is typically provided by automated controls.
Time between detection and determining severity is a part of response.
Readiness is the time it takes from detection to initiate a response. The first time that the incident response team typically becomes aware of an event is when an alert is provided by monitoring mechanisms.
Time between incident and resolution is a function of response capability.
The purpose of incident management and response is to:
A.recover an activity interrupted by an emergency or disaster within defined time and cost parameters.
B.perform a walk-through of the steps required to recover from an adverse event.
C.reduce business disruption insurance premiums for the business.
D.address disruptive events with the objective of controlling impacts within acceptable levels.
D is the correct answer.
Justification
This is the definition of a disaster recovery plan (DRP). The incident response process is sequentially the first response to an adverse event with aims of preventing the incident from escalating to a disaster.
A DRP table-top test or walk-through is performed to exercise the DRP in a test scenario to determine whether the steps that the enterprise needs to take to recover are reliably documented.
Business disruption insurance is an instrument of the risk management strategy to diversify and distribute the costs associated with an adverse event to a third party. Business insurance premiums are not dependent on incident management and response.
Incident management and response is a component of business continuity planning. As a first response to adverse events, the objective of incident management and response is to prevent incidents from becoming problems and to prevent problems from becoming disasters.
What is the FIRST action an information security manager should take when a company laptop is reported stolen?
A.Evaluate the impact of the information loss.
B.Update the corporate laptop inventory.
C.Initiate appropriate incident response procedures.
D.Disable the user account immediately.
C is the correct answer.
Justification
Evaluating the impact of the information loss would be a part of incident response procedures.
Updating inventory is of minor significance and can be done anytime.
The first step is to initiate incident response procedures.
Disabling the user account would be addressed as a part of incident response.
Which of the following needs to be MOST seriously considered when designing a risk-based incident response management program?
A.The chance of collusion among staff
B.Degradation of investigation quality
C.Minimization of false-positive alerts
D.Monitoring repeated low-risk events
D is the correct answer.
Justification
In general, any control practice is vulnerable to collusion, and if an incident is carefully crafted among a number of staff, it is hard to detect. However, successful collusion is not common.
As long as it is well-defined, it is unlikely that the quality of incident investigation will fall short.
A risk-based approach may not guarantee the minimization of false-positive alerts.
A risk-based approach focuses on high-risk items. Those attempting to commit fraud may take advantage of its weaknesses. When risk-based monitoring is in place, there is a higher chance of overlooking low-risk activities. Even though the impact of a low-risk event is small, it may not be possible to ignore the accumulated damage from its repeated occurrence. Therefore, it is essential to review the chance of the repeated occurrence of low-risk events.
Which of the following documents should be contained in a computer incident response team manual?
A.Risk assessment
B.Severity criteria
C.Employee phone directory
D.Table of all backup files
B is the correct answer.
Justification
Risk assessments would be available to the response team. However, they typically change at least annually, so it would not make sense to include them in the manual.
Severity criteria will remain relatively static and is the only one of the choices that is appropriate for the manual. The other choices will change frequently, and it would not make sense to reprint the manual every time phone numbers or backup files change.
A phone directory will change frequently and would not be included in the manual.
A table of backup files would typically be very large and change frequently and would not be included in the manual.
While defining incident response procedures, an information security manager must PRIMARILY focus on:
A.closing incident tickets in a predetermined time frame.
B.reducing the number of incidents.
C.minimizing operational interruptions.
D.meeting service delivery objectives.
D is the correct answer.
Justification
Closing tickets is not a priority of incident response.
Reducing the number of incidents is the focus of overall incident management.
Minimizing the impact on operations is not necessarily the primary focus. Some disruption in operations may be within acceptable limits.
The primary focus of incident response is to ensure that business-defined service delivery objectives are met.
Which of the following actions is MOST important when a server is infected with a virus?
A.Isolate the infected server from the network.
B.Identify all potential damage caused by the infection.
C.Ensure that the virus database files are current.
D.Establish security weaknesses in the firewall.
A is the correct answer.
Justification
The priority in this event is to minimize the effect of the virus infection and to prevent it from spreading by removing the infected server from the network.
After the network is secured from further infection, the damage assessment can be performed.
The virus signature files should be updated on a regular basis regardless of when a server was infected.
Detecting a virus infection is a function of the antivirus software and generally unrelated to weakness in the firewall.
The PRIMARY objective of incident response is to:
A.investigate and report results of the incident to management
B.gather evidence.
C.minimize business disruptions.
D.assist law enforcement in investigations.
C is the correct answer.
Justification
Investigating and reporting results of the incident is a responsibility of incident response teams but not the primary objective.
Gathering evidence is an activity that an incident response team may conduct, depending on circumstances, but not a primary objective.
The primary role of incident response is to detect, respond to and contain incidents so that impact to business operations is minimized.
Assisting law enforcement is an activity that an incident response team may conduct, depending on circumstances, but not a primary objective.
The MOST important purpose of implementing an incident response plan is to:
A.prevent the occurrence of incidents.
B.ensure business continuity.
C.train users on resolution of incidents.
D.promote business resiliency.
D is the correct answer.
Justification
The incident response plan is a means to respond to an event but does not prevent the occurrence.
Business continuity plans, not incident response plans, are designed to restore business operations after a disaster; they cannot assure the actual outcome.
The incident management plan may address training users, but the incident response plan does not.
Business resilience refers to the ability of the business to withstand disruption. An effective incident response plan minimizes the impact of an incident to the level that it ideally is transparent to end users and business partners.
The PRIMARY way in which incident management adds value to an enterprise is by:
A.reducing the overall threat level.
B.optimizing risk management efforts.
C.eliminating redundant recovery plans.
D.streamlining the reporting structure.
B is the correct answer.
Justification
Incident management focuses on prevention, containment and restoration activities and does not reduce the threat level.
Incident management is a component of risk management that can provide an optimal balance between prevention, containment and restoration.
Recovery plans are created by business and process owners. Incident management should ideally be integrated with continuity and recovery plans, but an enterprise does not seek to evaluate these plans for redundancy.
Reporting structures are typically created for business reasons. Incident management may play a role in clarifying or modifying the structures used for reporting incidents in particular, but streamlining the reporting structure is not the primary way in which incident management adds value to an enterprise.
The BEST time to determine who should notify external entities of an information security breach involving customer privacy data is:
A.after the incident has been detected and confirmed.
B.after the approval of the incident by senior management.
C.during the development of the incident response plan.
D.dependent on applicable laws and regulations.
C is the correct answer.
Justification
Determining roles and responsibilities during an incident is counterproductive and causes confusion.
Senior management does not approve incidents; incident response teams confirm them.
Responsibilities, including who should communicate what and how, should be established when the incident response plan is developed. This ensures that teams know their roles and responsibilities prior to an incident occurring.
Laws and regulations and requirements are part of the foundation of an incident response plan.
Which of the following benefits that the enterprise receives from employing a systematic incident management program with a formal methodology is MOST important?
A.A formal methodology makes incident management more flexible.
B.A formal methodology is more reliant on business continuity activities.
C.Each incident responder is able to get broad-based experience.
D.Evidence of due diligence supports legal and liability claims.
D is the correct answer.
Justification
The more formalized that something becomes, the less flexible it is.
A formal methodology is actually able to more easily operate as a stand-alone function, with less reliance on business continuity activities.
Having a formal methodology means that duties are generally assigned based on competence and availability of time.
Legal and liability claims are most credible when the mechanisms used to collect them are formally documented, repeatable and regularly practiced.
The information security manager identifies a vulnerability in a publicly exposed business application during risk assessment activities. The NEXT step to take is:
A.containment.
B.eradication.
C.analysis.
D.recovery.
C is the correct answer.
Justification
Containment is necessary when an incident is found to have occurred. Prior to analysis, the information security manager has no way of knowing whether an incident may have occurred in the past or might even still be underway, so analysis should precede containment.
Eradication is undertaken once an incident has been contained, which requires that it first be analyzed to determine its scope.
Identification of a vulnerability does not necessarily mean that an incident has occurred, but reliance on automated detection mechanisms when a vulnerability has been identified may allow any compromises that have already occurred to continue unimpeded. Analysis is appropriate to determine whether a threat actor may have already exploited the vulnerability and, if so, to determine the scope of the compromise.
Recovery is the last step taken before concluding an incident. At the time that a vulnerability is detected, there is no apparent impact, so recovery is not yet needed. Eradication and recovery will take place if an incident has occurred. However, it is important to first determine if an incident has taken place.
Which of the following is likely to be the MOST significant challenge when developing an incident management plan?
A.Misalignment between plan and organizational goals
B.Implementation of log centralization, correlation and event tracking
C.Development of incident metrics
D.Lack of management support and organizational consensus
D is the correct answer.
Justification
The incident management plan is a subset of the security strategy, which already aligns with organizational goals and, therefore, does not represent a major challenge.
Implementation of log centralization, correlation and event tracking is required, but it is not the most significant challenge.
Incident metrics must be developed, but they are straightforward and not a significant challenge.
Getting senior management buy-in is often difficult, but it is the necessary first step to move forward with any incident management plan.