Operations and Incident Response Flashcards
(40 cards)
You’re conducting a network security assessment and need to identify the actions typically taken during the “Containment” phase of incident response. What are common measures in this phase?
A) restoring affected systems to their original state, eliminating vulnerabilities
B) preventing the incident from spreading and causing further damage
C) documenting incident details and findings for future reference
D) identifying vulnerabilities and weaknesses in the system
Preventing the incident from spreading and causing further damage
During the “Containment” phase, the primary objective is to prevent the incident from spreading and causing more harm. This involves isolating affected systems or networks to limit the impact and prevent the situation from worsening.
A security analyst responding to a security incident involving unauthorized access to sensitive data. What is a common step during the “Eradication and Recovery” phase of incident response?
A) isolating affected systems and preventing the incident from spreading
B) documenting findings and actions taken for future reference
C) restoring affected systems to a secure state and implementing security updates
D) investigating the root cause of the incident and identifying gaps in security protocols
Restoring affected systems to a secure state and implementing security updates
The “Eradication and Recovery” phase involves restoring affected systems to a secure state by removing malware, applying security updates, and ensuring systems are secure and functional.
An organization experiences a data breach, and you’re part of the incident response team. What should be a priority during the “Lessons Learned” phase?
A) implementing additional security measures to prevent future incidents
B) identifying the intruder and reporting the breach to law enforcement
C) documenting the incident details and the actions taken for future reference
D) restoring affected systems and data to their original state
Documenting the incident details and the actions taken for future reference
During the “Lessons Learned” phase, it’s crucial to document incident details, actions taken, and their outcomes. This documentation helps improve future incident response strategies and training.
An organization encountered a significant Distributed Denial of Service (DDoS) attack. What is a key task during the “Preparation” phase of incident response planning?
A) detecting and analyzing the specifics of the ongoing attack
B) educating employees about common security threats and incident reporting procedures
C) isolating affected systems to contain the spread of the attack
D) restoring affected systems and implementing security updates
Educating employees about common security threats and incident reporting procedures
During the “Preparation” phase, educating employees about common security threats and incident reporting procedures is crucial for building a proactive security culture within the organization.
A company experiences a ransomware attack on its network. What is a significant action during the “Containment” phase of incident response for this scenario?
A) notifying regulatory bodies and affected shareholders
B) disconnecting affected systems from the network to prevent future encryption
C) documenting the attack details for post-incident analysis
D) conducting a comprehensive system-wide audit to identify the affected areas
disconnecting affected systems from the network to prevent future encryption
During the “Containment” phase in a ransomware attack, disconnecting affected systems from the network is crucial to halt the spread of encryption to other systems, limiting the damage.
A data breach incident occurred within an organization. What is an essential step during the “Lessons Learned” phase of incident response for this scenario?
A) identifying weaknesses in the incident response plan for immediate rectification
B) reporting the incident to law enforcement for further investigation
C) collecting evidence for potential legal actions against the perpetrators
D) documenting the shortcomings, actions, and improvements for future incident response
Documenting the shortcomings, actions, and improvements for future incident response
During the “Lessons Learned” phase, documenting the weaknesses, actions taken, and improvements for future incident responses is crucial for developing better strategies.
During a network security incident, what is an immediate task during the “Identification” phase of incident response?
A) disconnecting the affected systems from the network
B) implementing additional security measures to prevent further incidents
C) analyzing logs and traffic patterns to understand the incident’s nature
D) notifying company management and affected shareholders about the incident
Analyzing logs and traffic patterns to understand the incident’s nature
During the “Identification” phase, analyzing logs and traffic patterns is crucial to understand the nature and scope of the incident.
An organization suspects an insider threat. What is a vital step during the “Identification” phase of incident response for this situation?
A) notifying law enforcement for immediate investigation
B) conducting a comprehensive audit of user access logs and privileges
C) disabling network connectivity to prevent further potential damage
D) implementing new security protocols to prevent similar incidents
Conducting a comprehensive audit of user access logs and privileges
During the “Identification” phase for an insider threat, conducting a comprehensive audit of user access logs and privileges is crucial to identify unusual or suspicious activities within the network.
A company is addressing a significant breach in their database systems. What is an essential action during the “Containment” phase of incident response in this situation?
A) isolating affected systems and preventing the incident from spreading
B) informing the media and public about the breach for transparency
C) conducting a detailed investigation to identify the root cause
D) enhancing the system’s security through new firewalls and protocols
Isolating affected systems and preventing the incident from spreading
During the “Containment” phase, isolating affected systems is crucial to prevent the spread of the incident to other parts of the network and limit the damage.
An organization experiences a malware outbreak across its network. What should be a priority during the “Eradication and Recovery” phase of incident response in this scenario?
A) disconnecting affected systems from network
B) investigating the source of the malware and tracing its propagation
C) restoring affected systems to a clean and secure state
D) enhancing employee awareness of cybersecurity best practices
Restoring affected systems to a clean and secure state
During the “Eradication and Recovery” phase, restoring affected systems to a clean and secure state is a priority to eliminate the malware and return systems to normal functionality.
A system outage occurred due to a cyber attack. What is a crucial action during the “Lessons Learned” phase of incident response in this case?
A) filing lawsuits against identified attackers for damages
B) documenting the incident details, responses, and areas for improvement
C) implementing immediate measures to counter future cyber attacks
D) publicly announcing the incident to rebuild customer trust and confidence
Documenting the incident details, responses, and areas for improvement
During the “Lessons Learned” phase, documenting incident details and responses, and identifying areas for improvement is crucial for future incident response improvement.
A network administrator wants to map the network topology and identify active hosts and their connections. Which tool would be most suitable for this purpose?
A) tracert/traceroute
B) nslookup/dig
C) Nmap
D) ipconfig/ifconfig
Nmap
nmap (Network Mapper) is a powerful tool used for network discovery and security auditing. It scans networks, identifies active hosts, their services, and can provide information about open ports, OS detection, etc. It’s commonly used for mapping network topology.
A system administrator needs to analyze the route a packet takes to reach a specific server and identify any network delays. What tool should be utilized for this task?
A) ping/pathping
B) hping
C)netstat
D)netcat
Ping/pathping
The ping command, and its extended version pathping in Windows, is used to test connectivity and measure round-trip times between the source and a destination. It helps identify delays and packet loss on the network route.
A security analyst needs to perform a detailed examination of network packets, including crafting and sending custom packets to analyze network security. What tool best facilitates this analysis?
A) Wireshark
B) Metasploit
C) Cain and Abel
D) snort
Metasploit
Metasploit is an exploitation framework widely used for penetration testing and ethical hacking. It allows security researchers to create, test, and execute various exploits, payloads, and post-exploitation modules.
An IT administrator wants to test the strength of various passwords stored within the company’s database. What type of tool would be best for this task?
A) Wireshark
B) John the ripper
C) Nmap
D) snort
John the Ripper
John the Ripper is a well-known password-cracking tool used for testing and evaluating the strength of passwords stored within databases by employing various techniques like dictionary attacks, brute force, etc.
A data security officer needs to completely sanitize sensitive information from a retired hard drive, ensuring that no data is recoverable. What process would be ideal for this task?
A) encryption
B) disk wiping
C) file shredding
D) network segmentation
Disk wiping
Disk wiping involves overwriting data on a hard drive, making it nearly impossible to recover the data. It ensures sensitive information cannot be retrieved from the retired hardware.
A company wants to ensure that data sanitized from retired hardware cannot be recovered. What tool or method best achieves this goal?
A) data masking
B) disk encryption
C) degaussing
D) firewall implementation
Degaussing
Degaussing is a method that uses a powerful magnet to destroy data stored on magnetic media, such as hard drives, rendering the data irretrievable.
In the event of a major cybersecurity incident, what plan outlines the measures a company should take to continue its critical operations?
A) shareholder management plan
B) communication plan
C) disaster recovery plan
D) business continuity plan
Business continuity plan
The Business Continuity Plan (BCP) outlines the strategies and procedures a company should follow to continue critical operations during and after a disaster or incident. It focuses on maintaining essential business functions during and after the incident.
During an ongoing security incident, what plan describes the process of communicating with stakeholders and managing their concerns effectively?
A) shareholder management plan
B) communication plan
C) disaster recovery plan
D) business continuity plan
Communication plan
The Communication plan details the strategies for effective communication with stakeholders, customers, employees, and the public during an ongoing security incident, ensuring timely, accurate, and effective communication.
A company wants to have a detailed blueprint for recovering and restoring its IT systems and infrastructure after a disaster. What plan should be developed for this purpose?
A) stakeholder management plan
B) communication plan
C) disaster recovery plan
D) business continuity plan
Disaster recovery plan
The Disaster Recovery Plan (DRP) outlines the procedures for restoring and recovering IT systems and infrastructure after a disaster, ensuring the resumption of essential IT services.
A security analyst needs to review and analyze a variety of security events, including alerts and potential threats, in a single interface. What tool or resource is best suited for this purpose?
A) protocol analyzer output
B) reconfigure endpoint security solutions
C) SIEM dashboards
D) log files
SIEM dashboards
Security Information and Event Management (SIEM) dashboards provide a centralized interface for collecting, analyzing, and visualizing security-related events and alerts from various sources, enabling a comprehensive view of potential threats.
In an investigation of a security incident, which methodology is primarily used to identify, preserve, examine, and present digital evidence?
A) vulnerability scanning
B) risk management
C) digital forensics
D) data loss prevention
Digital forensics
Digital forensics is the process of identifying, preserving, examining, and presenting digital evidence. It involves a systematic investigation of digital devices or data to uncover potential evidence relevant to a security incident or investigation.
What is the primary purpose of using hashing in digital forensics?
A) to encrypt sensitive data
B) to identify unique files
C) to compress data for storage
D) to perform data recovery
To identify unique files
Hashing in digital forensics is used to create unique identifiers (hash values) for files or data. These unique hashes can verify data integrity and identify files, helping in identifying duplicates or alterations in digital evidence.
A file is identified as having been modified. What technique is typically used to verify the integrity of the file?
A) data hashing
B) data encryption
C) data recovery
D) data obfuscation
Data hashing
Data hashing is used to create a unique digital fingerprint (hash value) for a file or data. It is commonly used to verify file integrity by generating a hash and comparing it with the original hash to confirm if the file has been modified.