Review Questions - SYS701 - 14 - Monitoring and Incident Response
19 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Michael analyzes network traffic, including packet content, as part of his incident response process. What tool should he use?

  • Syslog
  • NetFlow
  • Packet capture (correct)
  • A SIEM

Susan wants to create a dashboard that shows her aggregated log events related to logins from different geographic regions. Her goal is to identify impossible travel scenarios. Which of the following solutions should she select to accomplish that goal?

  • IPS
  • OS logs
  • SIEM (correct)
  • Vulnerability scan data

Selah wants to ensure that users in her organization can only install applications that are evaluated and approved by the organization's security team. What should she use?

  • A SIEM
  • An application deny list
  • An application allow list (correct)
  • sFlow

What is the primary concern with sFlow in a large, busy network?

<p>sFlow samples only network traffic, meaning that some detail will be lost. (D)</p> Signup and view all the answers

Mark unplugs the network connection from a system that is part of an incident and places tape over its Ethernet jack with a sign that says, “Do not reconnect without approval from IR team.” How is this method best described?

<p>Isolation (B)</p> Signup and view all the answers

The company that Ben works for wants to test its incident response plan. Ben gathers the incident response team in a room and walks through a scenario to validate the organization's processes and procedures. What type of event has Ben hosted?

<p>A tabletop exercise (C)</p> Signup and view all the answers

Madhuri wants to check a PNG-formatted photo for GPS coordinates. Where can she find that information if it exists in the photo?

<p>In the photo's metadata (B)</p> Signup and view all the answers

Alyssa has identified malware on a system. She removes the system from the network to ensure that it cannot impact other systems. What technique has she used to deal with this system?

<p>Quarantine (A)</p> Signup and view all the answers

Kristen discovers missing logs as part of her threat hunting activities. What has most likely happened?

<p>An attacker wiped the logs to hide evidence. (C)</p> Signup and view all the answers

Ian has been receiving hundreds of false positive alerts from his SIEM every night when scheduled jobs run across his datacenter. What should he adjust on his SIEM to reduce the false positive rate?

<p>Sensitivity (B)</p> Signup and view all the answers

Which team member acts as a primary conduit to senior management on an IR team?

<p>Management (C)</p> Signup and view all the answers

Dana is reviewing her system's application logs and notices that a full backup of the application was done at 10 a.m. She knows that the job that runs the backup process is set to run overnight. What indicator should she flag this as?

<p>Out-of-cycle logging (D)</p> Signup and view all the answers

Jim wants to view log entries that describe actions taken by applications on a Red Hat Linux system. Which of the following tools can he use on the system to view those logs?

<p>journalctl (C)</p> Signup and view all the answers

Megan wants to ensure that logging is properly configured for her organization's Windows workstations. What could she use to ensure that logging best practices are configured?

<p>Benchmarks (B)</p> Signup and view all the answers

Chris has turned on logon auditing for a Windows system. Which log will show them?

<p>The Windows Security log (B)</p> Signup and view all the answers

Jayne wants to determine why a ransomware attack was successful against her organization. She plans to conduct a root cause analysis. Which of the following is not a typical root cause analysis method?

<p>Root/branch review (A)</p> Signup and view all the answers

Hitesh wants to keep a system online but limit the impact of the malware that was found on it while an investigation occurs. What method from the following list should he use?

<p>Containment (A)</p> Signup and view all the answers

What phase in the incident response process leverages indicators of compromise and log analysis as part of a review of events?

<p>Identification (D)</p> Signup and view all the answers

Henry wants to check to see if services were installed by an attacker. What commonly gathered organizational data can he use to see if a new service appeared on systems?

<p>Vulnerability scans (C)</p> Signup and view all the answers

Flashcards

More Like This

Use Quizgecko on...
Browser
Browser