Chapter 7 Questions Flashcards

(17 cards)

1
Q

What is the goal of incident response?

A. Prevent attacks only
B. Detect and minimise damage
C. Delete logs
D. Replace systems

A

Answer: B

Explanation:
Incident response aims to quickly detect security incidents and reduce their impact while maintaining business operations. It is not only about stopping attacks but also ensuring systems remain functional and recover properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which phase includes restoring systems?

A. Detection
B. Preparation
C. Recovery
D. Analysis

A

Answer: C

Explanation:
The recovery phase involves restoring systems to normal operation after an incident. This may include restoring backups, applying patches, and verifying systems are secure before returning to production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IR purpose?

A. Prevent
B. Respond to incidents
C. Encrypt
D. Backup

A

Answer: B

Explanation:
Incident Response (IR) is designed to handle security incidents once they occur. Its primary goal is to detect incidents quickly, contain them, and minimise damage while maintaining business operations. It is not just about prevention, but about managing real-time breaches effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

First IR phase?

A. Detection
B. Preparation
C. Recovery
D. Analysis

A

Answer: B

Explanation:
The first phase is Preparation, where organisations build their incident response capability. This includes training teams, defining procedures, and setting up tools such as SIEM systems. Strong preparation reduces response time and limits damage during actual incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Detection phase?

A. Identify incidents
B. Recover
C. Encrypt
D. Backup

A

Answer: A

Explanation:
The detection and analysis phase involves identifying and confirming security incidents. This can be done through alerts, logs, or user reports. It is critical because without detection, the organisation cannot respond to threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Containment means:

A. Detect
B. Stop spread
C. Recover
D. Log

A

Answer: B

Explanation:
Containment focuses on limiting the impact of an incident by stopping it from spreading. This may involve isolating infected systems, disconnecting networks, or disabling compromised accounts. Proper containment prevents further damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Eradication means:

A. Detect
B. Remove threat
C. Log
D. Backup

A

Answer: B

Explanation:
Eradication involves completely removing the root cause of the incident, such as deleting malware or closing vulnerabilities. It ensures that the attacker no longer has access to the system before recovery begins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Recovery means:

A. Detect
B. Restore systems
C. Log
D. Backup

A

Answer: B

Explanation:
Recovery restores systems to normal operation after an incident. This may include restoring from clean backups, applying patches, and verifying system integrity. The goal is to safely return systems to production without reintroducing vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Post-incident phase?

A. Attack
B. Lessons learned
C. Detection
D. Encryption

A

Answer: B

Explanation:
The post-incident phase focuses on analysing what happened and improving future response. Organisations conduct “lessons learned” reviews to identify weaknesses and update policies, tools, and procedures to prevent similar incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Playbook is:

A. Backup
B. Step-by-step IR guide
C. Firewall
D. SIEM

A

Answer: B

Explanation
A playbook in cybersecurity is a documented predefined, step‑by‑step set of procedures used to respond to specific security incidents. It outlines actions, tools, roles, and decision points so teams can react quickly and consistently. Playbooks help standardise incident handling, reduce errors, and improve response time.

Explanation:
A playbook is a documented set of procedures for responding to specific incidents. It provides clear instructions for analysts, reducing confusion and improving response consistency. Playbooks are essential in SOC environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Jump kit contains:

A. Logs
B. Tools for IR
C. Encryption
D. Backup

A

Answer: B

Explanation:
A jump kit is a portable collection of tools and resources used during incident response. It may include forensic tools, scripts, and documentation. It ensures analysts are ready to respond immediately without delays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Evidence handling ensures:

A. Speed
B. Legal validity
C. Logging
D. Encryption

Answer: B

A

Explanation:
Proper evidence handling ensures that collected data can be used in legal proceedings. This includes maintaining chain of custody and following procedures to preserve integrity. Poor handling can make evidence inadmissible in court.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is part of the incident response lifecycle?

A. Encryption
B. Preparation
C. Backup
D. Logging

A

Answer: B

Explanation:
The IR lifecycle includes Preparation, Detection & Analysis, Containment/Eradication/Recovery, and Post-Incident Activity. These stages guide organisations in handling incidents effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many phases are in the NIST IR lifecycle?

A. 2
B. 3
C. 4
D. 5

A

Answer: C

Explanation:
NIST defines 4 phases: Preparation, Detection & Analysis, Containment/Eradication/Recovery, and Post-Incident Activity. This is a key exam topic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why must containment be done carefully?

A. It slows system
B. It may trigger further damage
C. It deletes logs
D. It encrypts data

A

Answer: B

Explanation:
Some malware reacts to containment (e.g., losing connection) by triggering destructive actions like data wiping. Therefore, containment decisions must be carefully planned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why collect evidence early?

A. Save time
B. Preserve forensic data
C. Delete logs
D. Encrypt data

A

Answer: B

Explanation:
Evidence must be collected early to preserve its integrity. Delays can result in lost or altered data, which affects investigations and legal proceedings.

17
Q

What is the main goal of post-incident activity?

A. Attack
B. Improve future response
C. Detect malware
D. Encrypt data

A

Answer: B

Explanation:
Post-incident focuses on lessons learned, improving processes, and updating security controls. It ensures the organisation becomes stronger after each incident.