Section 31 Incident Response and Forensics Flashcards

1
Q

A set of procedures that an investigator follows when examining a computer security incident.

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Program consisting of the monitoring and detection of security events on a computer network and the execution of proper responses to those security events.

A

Incident Management Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Process of recognizing whether an event that occurs should be classified as an incident.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Focused on data restoration, system repair, and re-enabling any servers or networks taken offline during the incident response.

A

Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Signals that are sent between two parties or two devices that are sent via a path or method different from that of the primary communications between the two parties or devices.

A

Out of band communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Executives and managers who are responsible for business operations and functional areas.

A

Senior Leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Governmental organizations that oversee the compliance with specific regulations and laws.

A

Regulatory Bodies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The business or organization’s legal counsel is responsible for mitigating risk from civil lawmakers.

A

Legal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used to ensure no breaches of employment law or employee contracts is made using an incident response.

A

Human Resources (HR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used to manage negative publicity from a serious incident.

A

Public Relations (PR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Three variations of syslog which all permit the logging of data from different types of systems in a central repository.

A

Syslog/ry-slog/syslog-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Linux command line utility used for querying and displayed logs from journald, the systemd logging service on linux.

A

Journalctl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A multi platform log management tool that helps to easily identify security risks, policy branches or analyze operational problems in server logs, operation system logs, and application logs.

A

Nxlog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network protocol system created by CISCO that collects active IP network traffic as it flows in or out of an interface, including its point of origin, destination, volume and paths on the network.

A

Netflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Short “sampled flow”, it provides a means for exporting truncated packets, together with interface counters for the purpose of network monitoring.

A

sflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A universal standard of exporter for internet protocol flow information from routers, probes and other devices that are used by mediation systems, accounting/billing systems and network management systems to facilitate services such as measurement, accounting and billing by defining how IP flow information is to be formatted and transferred from an exporter to a collector.

A

IPfix

17
Q

Data that describes other data by providing an underlying definition or description by summarizing basic information about data that makes finding and working with particular instances of data easier.

A

Metadata

18
Q

Ensure authorization to collect evidence is obtained, and then document and prove the integrity of evidence as it is collected.

A

Collection

19
Q

Create a copy of evidence for analysis and use repeatable methods and tools during analysis

A

Analysis

20
Q

Create a report of the methods and tools used in the investigation and present detailed findings and conclusions based on the analysis.

A

Reporting

21
Q

A process designed to preserve all relevant information when litigation is reasonably expected to occur.

A

Legal Hold

22
Q

A tool that shows the sequence of file system events within a source image in a graphical format.

A

Timeline

23
Q

The methods and tools used to create a forensically sound copy of data from a source device, such as system memory or a hard disk.

A

Data Acquisition

24
Q

A network diagnostic command for displaying possible routes and measuring transit delays of packets across an internet protocol network.

A

tracert/tracer-route

25
Q

Utility used to determine the IP address associated with a domain name, obtain the mail server settings for a domain, and other DNS information.

A

nslookup/dig

26
Q

Utility that displays all the network configurations of the currently connected network devices and can modify the DHCP and DNS settings

A

ipconfig/ifconfig

27
Q

AN open source network scanner that is used to discover hosts and services on a computer network by sending packets and analyzing their responses.

A

nmap

28
Q

Utility used to determine if a host is reachable on an internet protocol network.

A

ping/pathping

29
Q

An open source packet generator and analyzer for the TCP/IP protocol that is used for security auditing and testing of firewalls and networks.

A

hping

30
Q

Utility that displays network connections for transmission control protocol, routing tables, and a number of network interfaces and network protocol statistics.

A

netstat

31
Q

Utility for reading from and writing to network connections using TCP or UDP which is a dependable backend that can be used directly or easily driven by other programs and scripts

A

netcat

32
Q

Utility for viewing and modifying the local Address Resolution Protocol (ARP) cache on a given host or server.

A

arp

33
Q

Utility that is used to view and manipulate the IP routing table on a host or server.

A

route

34
Q

An automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities across a network.

A

sn1per