Incident Response Steps Cissp
28 community-sourced questions and answers. Free — no login.
What is an incident?
Any event that has a negative effect on the CIA of an organization's assets
What is a computer security incident?
Refers to an incident that is the result of an attack or the result of malicious or intentional actions on the part of users. Organizations define the meaning of a computer security incident within their security policy or incident response plan
What are the steps of incident response?
1. Detection 2. Response 3. Reporting 4. Recovery 5. Remediation and review
What is primary goal of incident response?
Containment/limiting the effect or scope of the incident
Why are many incidents not reported?
They are not recognized as incidents. This is often a result of inadequate training.
What is the goal remediation and review in incident management?
To identify anything that can be modified to prevent a similar incident or to limit the severity of a similar incident
What are some basic preventative measures to protect against attacks?
Keep systems and applications up to date. Remove or disable unneeded services and protocols Use up to date antivirus software Use firewalls Use IDS and IPS
What is the most popular method of delivering malicious code today?
Drive by downloads
What is the most important protection against malicious code?
Using anti-virus software with up to date signatures
What are the 3 a zero-day exploit happens?
1. Attacker first discovers a vulnerability (Only they know of it at that point) 2. Vendor learns of vulnerability (Vendor is developing a patch but public doesn't know vulnerability) 3. Vendor releases patch (Some people refer to attacks the day after patch is released to the public)
What is Distributed Reflective Denial of Service (DRDoS) attack?
Doesn't attack the victim directly but instead manipulates traffic or network service so that attacks are reflected back to the victim from other sources. DNS poisoning and smurf attacks are examples
What is a SYN flood attack and how would you prevent it?
It disrupts the standard 3 way handshake used by TCP. One method of blocking SYN flood attacks is with SYN cookies. Also firewalls and IDS/IPS include mechanisms to check for SYN attacks
What is a Smurf attack?
Smurf attacks use ICMP echo packets instead of TCP SYN packets.
What is a Fraggle attack?
Fraggle attacks use UDP packets over UDP ports 7 and 19. The fraggle attack will broadcast a UDP packet using spoofed IP address of victim. All systems will start sending traffic to victim like in a smurf attack
What is a teardrop attack?
Attacker fragments traffic in such a way that data packets can't be put together. Current systems not susceptible to teardrop attacks. IDS can check for malformed packets.
What is a land attack?
When the attacker sends spoofed SYN packets using the victim's IP address as the source and destination address. Keep a system up to date and filtering traffic will stop it
What is one primary goal of an IDS?
Provide a means for a timely and accurate response to intrusions
What are the two common methods that IDSs evaluate data and detect malicious behavior?
Knowledge based detection (Signature matching or pattern matching) Behavior based detection (Starts by creating a baseline of normal activity and can detect abnormal activity that may indicate a malicious intrusion or event)
What is a drawback of knowledge based detection?
It is only effective against known attacks
What is a drawback of behavior based detection?
Often raises false alarms
What is the passive response of an IDS?
Logs the event and sends a notification
What is the active response of an IDS?
Changes the environment to block the activity in addition to logging and sending a notification
What is a benefit of HIDS over NIDS?
It is able to detect anomalies on the host system
What is a drawback of HIDS over NIDS?
It is costly and may use up system resources. Also logs are stored on the machine
What is the distinguishing difference between an IDS and an IPS?
An IPS is placed in line with network traffic. All traffic must pass through the IPS and the IPS can choose what traffic to forward and what traffic to block after analyzing it
What is a padded cell?
When an IDS detects an intruder, they are automatically transferred to a padded cell. The padded cell has the look and feel of an actual network, but the attacker is unable to perform any malicious activities or access any confidential data from within the padded cell
What is a darknet?
A darknet is a portion of allocated IP addresses within a network that are not used. It includes one device configured to capture all the traffic into the darknet. A benefit to darknets is that there are few false positives. Legitimate traffic should not be in the darknet, so unless there is a misconfiguration on the network, traffic in the darknet is not legitimate.
Where is antivirus software commonly installed?
At the boundary between the Internet and the internal network, on email servers, and on each system
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials