Ch. 22: Incident Response - Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which infection method involves planting malware on a website that the victim employees will likely visit?

remote-access trojan (RAT) attack

Which term refers to the examination of machines to determine what operating systems, services, and vulnerabilities exist?

scanning

How is quarantine accomplished?

through the erection of firewalls that restrict communication between machines

Which indicator of compromise (IOC) standard is a method of information sharing developed by MITRE?

Cyber Observable Expression (CybOX)

What is the first rule of incident response investigation?

Do no harm.

All data is equally important, and thus equally damaging in the event of loss. True or False?

False

Data storage should be governed by what you can store. True or False?

False

Detecting that a security event is occurring or has occurred is an easy matter. True or False?

False

Large organizations typically have the resources to protect everything against all threats. True or False?

False

Operating in a state of compromise means that one must suffer significant losses. True or False?

False

How do most advanced persistent threats (APTs) begin?

Most APTs begin through a phishing or spear phishing attack.

A common technical mistake during the initial response to an incident is "killing" rogue processes. True or False?

True

What is the primary factor to assess in determining the level of incident response?

information criticality

Which attack type is common, and to a degree, relatively harmless?

port scan

What tool is the protocol/standard for the collection of network metadata on the flows of network traffic?

NetFlow

What is a key guideline to follow when designing incident response procedures?

Include appropriate business personnel.

Which indicator of compromise (IOC) standard is an open-source initiative established by Mandiant that is designed to facilitate rapid communication of specific threat information associated with known threats?

OpenIOC

What should an incident response team do when they are notified of a potential incident?

The team should confirm the existence, scope, and magnitude of the event and then respond accordingly.

Blocking lateral movement can defeat Advanced Persistent Threats(APT)-style attacks from spreading through a network and can limit their stealth. True or False?

True

Data breaches can be mitigated through minimization and encryption efforts. True or False?

True

Information criticality is defined as the relative importance of specific information to the business. True or False?

True

Recovery is the returning of the asset into the business function. True or False?

True

What are the two components comprising information criticality?

data classification and quantity of data involved

In an "old school" attack, which step is a listing of the systems and vulnerabilities to build an attack game plan?

enumeration

What two components are necessary for successful incident response?

knowledge of one's own systems and knowledge of the adversary


Conjuntos de estudio relacionados

Electricity and Magnetism Chap 2-3

View Set

PSY 2012 Exam 4, PSY 2012 EXAM 3, PSY2012 Exam 2 Study Questions, PSY 2012 Exam 1, Ultimate PSY2012 Study Guide

View Set

Aristotle's Nicomachean Ethics: Reading Guide

View Set

Market Segmentation, Targeting, and Positioning Strategies in Marketing

View Set

National-Ownership of Real Property

View Set

Module 5: Special Distributions, the Sample Mean, and the Central Limit Theorem

View Set