Questions 51-100 – Flashcards
Unlock all answers in this set
Unlock answersquestion
Question Companies may want to consider budgeting for contributions to employee loss expenses (such as funerals) as well as for counseling services for employees and loved ones as part of ____.
answer
Answer b. crisis management budgeting
question
Question A CPMT should include _____ who can oversee the security planning of the project and provide information on threats, vulnerabilities, and recovery requirements needed in the planning process.
answer
Answer b. information security managers
question
Question Should an incident begin to escalate, the CSIRT team leader continues to add resources and skill sets as necessary to attempt to contain and terminate the incident. The resulting team is called the ____ for this particular incident.
answer
Answer a. reaction force
question
Question ____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.
answer
Answer d. Forensics analysis
question
Question A(n) ____ is a CSIRT team member, other than the team leader, who is currently performing the responsibilities of the team leader in scanning the organization's information infrastructure for signs of an incident.
answer
Answer b. IR duty officer
question
Question The ____ Department of an organization needs to review the procedures of the CSIRT and understand the steps the CSIRT will perform to ensure it is within legal and ethical guidelines for the municipal, state, and federal jurisdictions.
answer
Answer c. Legal
question
Question In computer-based training settings, trainees receive a seminar presentation at their computers.
answer
Answer b. False
question
Question A recommended practice for the implementation of the physical IR plan is to select a ____ binder.
answer
Answer c. red
question
Question The committees of the CPMT follow a set of general stages to develop their subordinate plans. In the case of incident planning, the first stage is to ____.
answer
Answer b. form the IR planning committee
question
Question One of the primary responsibilities of the IRP team is to ensure that the ____ is prepared to respond to each incident it may face.
answer
Answer a. CSIRT
question
Question A recommended practice for the implementation of the physical IR plan document is to organize the contents so that the first page contains the ____ actions.
answer
Answer c. "during attack"
question
Question A(n) ____ is a detailed examination of the events that occurred, from first detection of an incident to final recovery.
answer
Answer d. after-action review
question
Question The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes: 1) preparation; 2) detection and analysis; 3) containment, eradication, and recovery; and 4) ____.
answer
Answer d. post-incident activity
question
Question General users require training on the technical details of how to do their jobs securely, including good security practices, ____ management, specialized access controls, and violation reporting.
answer
Answer d. password
question
Question A recommended practice for implementation of a physical IR plan document is to attach copies of relevant documents such as service agreements for the ISP, telephone, water, gas, etc.
answer
Answer a. True
question
Question The responsibility for creating an organization's IR plan often falls to the ____.
answer
Answer a. chief information security officer
question
Question The Southeast Collegiate Cyber Defense Competition is unique in that it focuses on the operational aspect of managing and protecting an existing network infrastructure. Unlike "capture-the-flag " exercises, this competition is exclusively a real-world ____ competition.
answer
Answer b. defensive
question
Question The U.S. National Institute of Standards and Technology recommends a set of tools for the CSIRT including incident reporting mechanisms with which users can report suspected incidents. At least one of these mechanisms should permit people to report incidents ____.
answer
Answer d. anonymously
question
Question In contingency planning, an adverse event that threatens the security of an organization's information is called a(n) ____.
answer
Answer b. incident
question
Question Incident analysis resources include network diagrams and lists of ____, such as database servers.
answer
Answer b. critical assets
question
Question The training delivery method with the lowest cost to the organization is ____.
answer
Answer d. self-study (noncomputerized)
question
Question E-mail spoofing attacks require an immediate response, typically no more than 30 minutes to one hour.
answer
Answer b. False
question
Question A favorite pastime of information security professionals is ____, which is a simulation of attack and defense activities using realistic networks and information systems.
answer
Answer b. war gaming
question
Question There are several national training programs that focus on incident response tools and techniques.
answer
Answer a. True
question
Question Organizing the incident response planning process begins with staffing the disaster recovery committee.
answer
Answer b. False
question
Question ____ incident responses enables the organization to react to a detected incident quickly and effectively, without confusion or wasted time and effort.
answer
Answer a. Predefining
question
Question The IR plan is usually ____ when an incident causes minimal damage with little or no disruption to business operations.
answer
Answer c. activated
question
Question The ____ of an organization defines the roles and responsibilities for incident response for the CSIRT and others who will be mobilized in the activation of the plan.
answer
Answer a. IR policy
question
Question Most organizations will find themselves awash in incident candidates at one time or another, and the vast majority will be ____.
answer
Answer c. false positives
question
Question The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software program called ____ running on an open source UNIX or Linux system that can be managed and queried from a desktop computer using a client interface.
answer
Answer d. Snort
question
Question A(n) ____ is a sign that an activity now occurring may signal an incident that could occur in the future.
answer
Answer d. precursor
question
Question The ____ is a federal law that creates a general prohibition on the realtime monitoring of traffic data relating to communications.
answer
Answer c. Pen/Trap Statute
question
Question In the event that a definite indicator is recognized, the corresponding ____ must be activated immediately.
answer
Answer a. IR plan
question
Question A(n) ____ is any system resource that is placed onto a functional system but has no normal use for that system. If it attracts attention, it is from unauthorized access and will trigger a notification or response.
answer
Answer c. honeytoken
question
Question To help make the detection of actual incidents more reliable, there are three broad categories of incident indicators that have been identified: possible, probable, and definite.
answer
Answer a. True
question
Question ____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can provide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation.
answer
Answer b. Honeypots
question
Question The Windows Task Manager can be used to seek out Trojan programs on Microsoft Windows computers.
answer
Answer b. False
question
Question A ____ rootkit is one that becomes a part of the system bootstrap process and is loaded every time the system boots.
answer
Answer d. persistent
question
Question The ____ of a hub, switch or other networking device is a specially configured connection that is capable of viewing all the traffic that moves through the entire device.
answer
Answer a. monitoring port
question
Question If an intruder can ____ a device, then no electronic protection can deter the loss of information.
answer
Answer a. physically access
question
Question The task of monitoring file systems for unauthorized change is best performed by using a(n) ____.
answer
Answer c. HIDPS
question
Question Most modern antivirus/anti-malware utilities cannot detect rootkits.
answer
Answer b. False
question
Question The ongoing activity from alarm events that are accurate and noteworthy but not necessarily significant as potentially successful attacks is called ____.
answer
Answer c. noise
question
Question The process of evaluating the circumstances around organizational events includes determining which adverse events are possible incidents, or ____.
answer
Answer d. incident candidates
question
Question In an attack known as ____, valid protocol packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on that network.
answer
Answer c. DNS cache poisoning
question
Question The ____ approach for detecting intrusions is based on the frequency with which certain network activities take place.
answer
Answer c. anomaly-based IDPS
question
Question A(n) ____ is the set of rules and configuration guidelines governing the implementation and operation of IDPSs within the organization.
answer
Answer b. site policy
question
Question Many attacks come through ports and then attack legitimate processes to allow themselves access or to conduct subsequent attacks.
answer
Answer a. True
question
Question According to the NIST definition of an event as "any observable occurrence in a system or network," all events are computer or network oriented.
answer
Answer b. False
question
Question New systems can respond to an incident threat autonomously, based on preconfigured options that go beyond simple defensive actions usually associated with IDPS and IPS systems. These systems, referred to as ____, use a combination of resources to detect an intrusion and then to trace the intrusion back to its source.
answer
Answer d. trap and trace