IT CertificationsAnswer Key

Incident Response Steps Cissp

28 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

What is an incident?

ANSWER

Any event that has a negative effect on the CIA of an organization's assets

QUESTION 2

What is a computer security incident?

ANSWER

Refers to an incident that is the result of an attack or the result of malicious or intentional actions on the part of users. Organizations define the meaning of a computer security incident within their security policy or incident response plan

QUESTION 3

What are the steps of incident response?

ANSWER

1. Detection 2. Response 3. Reporting 4. Recovery 5. Remediation and review

QUESTION 4

What is primary goal of incident response?

ANSWER

Containment/limiting the effect or scope of the incident

QUESTION 5

Why are many incidents not reported?

ANSWER

They are not recognized as incidents. This is often a result of inadequate training.

QUESTION 6

What is the goal remediation and review in incident management?

ANSWER

To identify anything that can be modified to prevent a similar incident or to limit the severity of a similar incident

QUESTION 7

What are some basic preventative measures to protect against attacks?

ANSWER

Keep systems and applications up to date. Remove or disable unneeded services and protocols Use up to date antivirus software Use firewalls Use IDS and IPS

QUESTION 8

What is the most popular method of delivering malicious code today?

ANSWER

Drive by downloads

QUESTION 9

What is the most important protection against malicious code?

ANSWER

Using anti-virus software with up to date signatures

QUESTION 10

What are the 3 a zero-day exploit happens?

ANSWER

1. Attacker first discovers a vulnerability (Only they know of it at that point) 2. Vendor learns of vulnerability (Vendor is developing a patch but public doesn't know vulnerability) 3. Vendor releases patch (Some people refer to attacks the day after patch is released to the public)

QUESTION 11

What is Distributed Reflective Denial of Service (DRDoS) attack?

ANSWER

Doesn't attack the victim directly but instead manipulates traffic or network service so that attacks are reflected back to the victim from other sources. DNS poisoning and smurf attacks are examples

QUESTION 12

What is a SYN flood attack and how would you prevent it?

ANSWER

It disrupts the standard 3 way handshake used by TCP. One method of blocking SYN flood attacks is with SYN cookies. Also firewalls and IDS/IPS include mechanisms to check for SYN attacks

QUESTION 13

What is a Smurf attack?

ANSWER

Smurf attacks use ICMP echo packets instead of TCP SYN packets.

QUESTION 14

What is a Fraggle attack?

ANSWER

Fraggle attacks use UDP packets over UDP ports 7 and 19. The fraggle attack will broadcast a UDP packet using spoofed IP address of victim. All systems will start sending traffic to victim like in a smurf attack

QUESTION 15

What is a teardrop attack?

ANSWER

Attacker fragments traffic in such a way that data packets can't be put together. Current systems not susceptible to teardrop attacks. IDS can check for malformed packets.

QUESTION 16

What is a land attack?

ANSWER

When the attacker sends spoofed SYN packets using the victim's IP address as the source and destination address. Keep a system up to date and filtering traffic will stop it

QUESTION 17

What is one primary goal of an IDS?

ANSWER

Provide a means for a timely and accurate response to intrusions

QUESTION 18

What are the two common methods that IDSs evaluate data and detect malicious behavior?

ANSWER

Knowledge based detection (Signature matching or pattern matching) Behavior based detection (Starts by creating a baseline of normal activity and can detect abnormal activity that may indicate a malicious intrusion or event)

QUESTION 19

What is a drawback of knowledge based detection?

ANSWER

It is only effective against known attacks

QUESTION 20

What is a drawback of behavior based detection?

ANSWER

Often raises false alarms

QUESTION 21

What is the passive response of an IDS?

ANSWER

Logs the event and sends a notification

QUESTION 22

What is the active response of an IDS?

ANSWER

Changes the environment to block the activity in addition to logging and sending a notification

QUESTION 23

What is a benefit of HIDS over NIDS?

ANSWER

It is able to detect anomalies on the host system

QUESTION 24

What is a drawback of HIDS over NIDS?

ANSWER

It is costly and may use up system resources. Also logs are stored on the machine

QUESTION 25

What is the distinguishing difference between an IDS and an IPS?

ANSWER

An IPS is placed in line with network traffic. All traffic must pass through the IPS and the IPS can choose what traffic to forward and what traffic to block after analyzing it

QUESTION 26

What is a padded cell?

ANSWER

When an IDS detects an intruder, they are automatically transferred to a padded cell. The padded cell has the look and feel of an actual network, but the attacker is unable to perform any malicious activities or access any confidential data from within the padded cell

QUESTION 27

What is a darknet?

ANSWER

A darknet is a portion of allocated IP addresses within a network that are not used. It includes one device configured to capture all the traffic into the darknet. A benefit to darknets is that there are few false positives. Legitimate traffic should not be in the darknet, so unless there is a misconfiguration on the network, traffic in the darknet is not legitimate.

QUESTION 28

Where is antivirus software commonly installed?

ANSWER

At the boundary between the Internet and the internal network, on email servers, and on each system

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials