Incident Response Flashcards

(28 cards)

1
Q

What is the goal of Incident Response?

A
  • impact
  • detection and containment
  • Facilitate recovery

Incident response is a systematic approach to managing and mitigating security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the key steps in the Incident Response process.

A
  • Detection
  • Classification
  • Containment
  • Eradication
  • Evidence preservation
  • Communication
  • Lessons learned

These steps are essential for effectively managing security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the seven phases of the Incident Response process according to the CompTIA model?

A
  • Preparation
  • Detection
  • Analysis
  • Containment
  • Eradication
  • Recovery
  • Post-Incident Activity

This model expands on the NIST four-phase incident response process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or false: Threat Hunting is a proactive cybersecurity approach for continuous threat identification.

A

TRUE

It involves actively seeking out potential threats within your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of Root Cause Analysis (RCA)?

A
  • Identify the initial source of an incident
  • Prevent it from recurring

RCA is a systematic process to investigate incidents and identify underlying factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: Incident Response Training and Testing includes methods such as _______.

A
  • Tabletop Exercises
  • Simulations
  • Drills
  • Live Exercises

These methods prepare personnel and systems for effective incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four main phases of Digital Forensic Procedures?

A
  • Identification
  • Collection
  • Analysis
  • Reporting

These phases are crucial for investigating and analyzing digital devices and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Order of Volatility dictate in data collection?

A

The sequence in which data sources should be collected based on their susceptibility to modification or loss

Following this order minimizes data loss during incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Chain of Custody?

A

Documented and verifiable record that tracks the handling, transfer, and preservation of digital evidence

It ensures that evidence remains intact and is admissible in court.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of Legal Hold in digital forensics?

A

Preserves potentially relevant electronic data when litigation is expected

It ensures evidence is not tampered with, deleted, or lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the goal of Incident Response Training?

A

Ensure employees and staff understand incident response processes, procedures, and priorities

Training should be tailored to different roles within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the benefit of Root Cause Analysis?

A
  • Identifies vulnerabilities and weaknesses
  • Creates robust protections against cyber threats
  • Encourages a no-blame culture

RCA focuses on solutions and improvements rather than assigning fault.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of Digital Forensics?

A

Investigating and analyzing digital devices and data to uncover evidence for legal purposes

This process is crucial for legal proceedings related to cybercrimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the steps in Threat Hunting?

A
  • Establishing a Hypothesis
  • Profiling Threat Actors and Activities
  • Threat Hunting Process

These steps help in actively seeking out potential threats within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the importance of Incident Response Team?

A
  • Includes cybersecurity professionals with incident response experience
  • Temporary members may be added as needed

Large organizations may have full-time teams, while smaller ones form temporary teams for specific incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Tabletop Exercise (TTX)?

A

A theoretical exercise that presents an incident response scenario for discussion

It is cost-effective but lacks hands-on experience.

17
Q

What does E-Discovery involve?

A

Identifying, collecting, and presenting electronically stored information for potential legal proceedings

This process is crucial for litigation involving electronic data.

18
Q

What is the purpose of performing analysis on a disk image instead of the original drive?

A

To prevent modifications or alterations

Analyzing a disk image ensures the integrity of the original data.

19
Q

What are the Digital Forensic Collection Techniques?

A
  • Making forensic images of data
  • Allowing incident response teams to resume operations quickly
  • Maintaining evidence for potential legal action

These techniques are crucial for effective incident response and legal compliance.

20
Q

What does data collection involve?

A
  • Capturing and hashing system images
  • Analyzing data with forensic tools
  • Capturing machine screenshots
  • Reviewing network logs
  • Collecting CCTV video

These steps are essential for thorough data analysis in forensic investigations.

21
Q

Name two forensic tools used in data analysis.

A
  • FTK (Forensic Toolkit)
  • EnCase

These tools are widely used in digital forensics for data analysis.

22
Q

What does the Order of Volatility guide?

A

The sequence of collecting data from most volatile to least volatile

This order helps prioritize data collection to preserve critical information.

23
Q

What is the significance of licensing and documentation reviews in data collection?

A

Ensures system configurations align with their design

This step is important for maintaining compliance and integrity in forensic investigations.

24
Q

What is data acquisition?

A

The method and tools used to create a forensically sound copy of data from a source device

This process is crucial for preserving evidence in digital forensics.

25
What complicates data acquisition in a **BYOD** (Bring Your Own Device) environment?
It may not be legally possible to search or seize the devices ## Footnote This legal complexity requires careful consideration during data collection.
26
Some data can only be collected once the system is _______.
shutdown or the power is disconnected ## Footnote This is important for ensuring the integrity of the data collected.
27
List the **Order of Volatility** from most to least volatile.
* CPU registers and cache memory * System memory (RAM) * Data on persistent mass storage * Remote logging and monitoring data * Physical configuration and network topology * Archival data ## Footnote This order helps prioritize data collection efforts in forensic investigations.
28
True or false: Some Windows registry keys, like **HKLM/Hardware**, are only in memory and require a memory dump to analyze.
TRUE ## Footnote This highlights the importance of capturing memory for a complete forensic analysis.