Practice Questions Flashcards
(116 cards)
Risk is defined as the probability of the occurrence of an incident. Risk formulation generally begins with the likeliness of an event’s occurrence, the harm it may cause, and is usually denoted as:
Significances
Probability
Magnitudes
Consequences
Consequences
Which of the following refers to the process of identifying, labeling, recording, and acquiring data from all possible sources?
a. Collection
b. Preservation
c. Examination
d. Analysis
Collection
Which among the following incidents refer to a person gaining access to system and network resources which he/she was not authorized to have?
a. Handling Inappropriate Usage Incidents
b. Unauthorized Access Incident
c. Handling Multiple Component Incidents
d. Authorized Access Incident
Unauthorized Access Incident
What is the purpose of proactive services offered by a CERT?
a. To find the cost of fixing a problem
b. To develop the infrastructure and security processes
c. To provide services to the constituency
d. None of the above
To develop the infrastructure and security processes
Which one of the following CSIRT services include alerts and warnings, incident handling, vulnerability handling, and artifact handling activities?
a. Reactive Services
b. Proactive Services
c. Security Quality Management Services
d. Vulnerability Management Services
Reactive Services
Which of the following is defined as the existence of a weakness in the design or implementation error that can lead to an unexpected, undesirable event compromising the security of the system?
a. Vulnerability
b. Patch
c. Attack
d. Accident
Vulnerability
Which one of the following is the intangible cost for an incident?
a. Lost productivity hours
b. Investigation and recovery efforts
c. Loss of business
d. Loss of reputation
Loss of reputation
Which of the following document contains logs, records, documents, and any other information that is found on a system?
a. Incident preparation report
b. Incident response report
c. Host-based evidence report
d. Network-based evidence report
Host-based evidence report
Which among the following malware pretends to be a program that offers useful applications, but acquires the information of the computer and sends it to a remote attacker?
a. Spyware
b. Worm
c. Virus
d. Rootkit
Spyware
Rob, an incident manager, was informed about an incident where a suspicious application was found residing in the active memory of multiple systems on a network. Upon investigation, he found that the application was self-replicating and degrading the systems’ performance, but it did not affect the files in those systems.
What is your inference from the above scenario?
a. The application is a Worm
b. The application is a Virus
c. The application is a Trojan
d. The application is a Backdoor
The application is a Worm
Identify the malicious program that is masked as a genuine harmless program, and gives the attacker unrestricted access to the user’s information and system. These programs may unleash dangerous programs that may erase the unsuspecting user’s disk, and send the victim’s credit card numbers and passwords to a stranger.
Cookie tracker
Worm
Virus
Trojan
Trojan
Which policy recommends controls for securing and tracking organizational resources?
Access control policy
Administrative security policy
Acceptable use policy
Asset control policy
Asset control policy
Which of the following terms may be defined as “a measure of possible inability to achieve a goal, objective, or target within a defined security, cost, plan, and technical limitations that adversely affects the organization’s operations and revenues?”
Incident Response
Threat
Vulnerability
Risk
Risk
The goal of incident response is to handle the incidents in a way that minimizes damage and reduces recovery time and costs. Which of the following does not constitute a goal of incident response?
Dealing properly with legal issues that may arise during incidents
Using information gathered during incident handling to prepare for handling future incidents in a better way and to provide stronger protection for systems and data
Helping personnel to recover quickly and efficiently from security incidents, minimizing loss or theft of information and disruption of services
Dealing with human resource department and various employee conflict behaviors
Dealing with human resource department and various employee conflict behaviors
Organizations, or incident response teams, need to protect the evidence for any future legal actions that may be taken against perpetrators that intentionally attacked the computer system. Evidence protection is also required to meet legal compliance issues. Which of the following documents helps in protecting evidence from physical or logical damage?
Chain-of-Custody
Chain-of-Precedence
Forensic analysis report
Network and Host log records
Chain-of-Custody
An audit trail policy collects all audit trails such as series of records of computer events, about an operating system, an application, or user activities. Which of the following statements is not true for an audit trail policy?
It helps in reconstructing the events after a problem has occurred
It helps in calculating intangible losses to the organization due to an incident
It helps in compliance to various regulatory laws, rules, and guidelines
It helps in tracking individual actions and allows users to be personally accountable for their actions
It helps in calculating intangible losses to the organization due to an incident
Which of the following risk mitigation strategy make an organization absorb minor risks while preparing to respond to major ones?
a. Risk avoidance
b. Risk limitation
c. Risk assumption
d. Risk planning
Risk assumption
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutes in the Netherlands, and deals with all cases related to computer security incidents in which a customer is involved, either as a victim or as a suspect?
Funet CERT
SURFnet-CERT
NET-CERT
DFN-CERT
SURFnet-CERT
Which of the following is defined as an organized approach to address and manage the aftermath of a security breach or attack?
a. Threat
b. Risk Assessment
c. Vulnerability assessment
d. Incident response
Incident response
Which of the following is an indication of unauthorized usage of the standard user account?
a. Usage of secret account
b. Alert of network and host IDS
c. Misplaced hardware parts
d. Increase in the usage of resource
Usage of secret account
A file or an object found on the system that might involve attacking systems and networks is known as an “artifact”. Handling an artifact involves receiving information about the artifacts that are used in intruder attacks, investigation, and other unauthorized activities causing distortions. Identify the CSIRT service category that artifact handling belongs to?
Reactive services
Proactive services
Incident tracking and reporting systems services
Security quality management services
Reactive services
Which of the following is a process that ensures systems and major applications adhere to formal and established security requirements that are well documented and authorized?
a. Penetration testing
b. Computer forensics
c. Certification and Accreditation (C&A)
d. Incident handling
Certification and Accreditation (C&A)
Mysoft, a major software developer located out of New Jersey, realized that sensitive information from folders shared across its network is being accessed by unauthorized people and leaked to third parties, which could result in huge financial losses for the organization. In this context, which of the following statements most appropriately defines “computer security incident”?
Events related to physical security incidents and trouble- shooting issues in corporate networks
Any real or suspected adverse event in relation to the security of computer systems or networks
Policies guaranteeing access to information system resources
Rectifying the loss of information that may affect the investment of the organization in different business activities
Any real or suspected adverse event in relation to the security of computer systems or networks
A Distributed Denial-of-Service (DDoS) attack is a more common type of DoS attack, where a single system is targeted by a large number of infected machines over the Internet. In a DDoS attack, attackers first infect multiple systems which are known as:
a. Spyware
b. Zombies
c. Worms
d. Trojans
Zombies