Operations and Incident Response Flashcards

1
Q

What should you identify about a user before implementing the principle of least privilege?

A

User’s job function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To provide checks and balances and to prevent one person from gaining too much power over a system, which type of security policy should you implement?

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three basic questions answered by the chain of custody?

A
  • Who controlled the evidence
  • Who secured the evidence
  • Who obtained the evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which policy should be reviewed by the security administrator to determine what data is allowed to be collected from users of the corporate Internet-facing Web application?

A

Company’s privacy policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What document lists the steps to take in case of a disaster to your main IT site?

A

Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why should a first responder be familiar with the incident response plan?

A

To ensure that the appropriate procedures are followed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the proper life cycle of evidence steps?

A

Collection, analysis, storage, court presentation, and return to owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must you do for an effective security auditing policy, besides creating security logs?

A

Analyze the logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which assessment examines whether network security practices follow a company’s security policy?

A

Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is responsible for most security incidents in an organization?

A

Employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is meant by the term legal hold?

A

A process that an organization uses to preserve all forms of relevant information when preservation is needed for litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should the proper chain of custody be ensured?

A

So that evidence will be admissible in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is wireshark?

A

A protocol analyzer or packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which policy defines the technical means that are used to protect data on a network?

A

Security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

According to the CompTIA Security+ blueprint, what are the six steps in the incident response process?

A
  1. Preparation
  2. Identification
  3. Containment
  4. Eradication
  5. Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which log in Event View should you open to view events that are generated based on your auditing settings?

A

Security log

17
Q

When evidence is seized, which principle should be emphasized?

A

Chain of custody

18
Q

What is the primary goal of business continuity planning?

A

Maintain the organization

19
Q

Which document is used when it is necessary to invoke legal action against an employee for inappropriate use of computer resources?

A

Acceptable use policy

20
Q

What is the name of the process for removing only the incriminating data from the audit logs

21
Q

What are correlation engines

A

Applications that examine relationships between entries in firewall logs to understand possible attacks

22
Q

What is the name of the group of people appointed to respond to security incidents?

A

Incident response team

23
Q

Which security measure prevents fraud by reducing the chances of collision?

A

Separation of duties

24
Q

Which team is responsible for restoring critical business functions at an alternate site in the event of disruption?

A

Recovery team

25
Which principle ensures that users are given the most restrictive user rights to complete their authorized job duties?
The principle of least privilege
26
Which tool should you use to retrieve the contents of a FET request: a protocol analyzer or port scanner?
A protocol analyzer
27
What is the name of the security process that involves recognition, verification, classification, containment, and analysis?
An incident response
28
What is incident management?
The activities of an organization to identify, analyze, and correct risks as they are identified