The other three phases such as preparation, recovery, and reporting are not that challenging. The scope of preparation and prevention phase covers establishing plans, policies, and procedures. The scope of recovery phase includes containment, restore, and eradication. The scope of reporting phase involves understanding the internal and external reporting requirements in terms of the content and timeliness of the reports.
187. Regarding incident response data, nonperformance of which one of the following items makes the other items less important?
a. Quality of data
b. Review of data
c. Standard format for data
d. Actionable data
188. Which of the following statements about incident management and response is
a. Most incidents require containment.
b. Containment strategies vary based on the type of incident.
c. All incidents need eradication.
d. Eradication is performed during recovery for some incidents.
189. Which of the following is the correct sequence of events taking place in the incident response life cycle process?
a. Prevention, detection, preparation, eradication, and recovery
b. Detection, response, reporting, recovery, and remediation
c. Preparation, containment, analysis, prevention, and detection
d. Containment, eradication, recovery, detection, and reporting
Detection involves the use of automated detection capabilities (for example, log analyzers) and manual detection capabilities (for example, user reports) to identify incidents. Response involves security staff offering advice and assistance to system users for the handling and reporting of security incidents (for example, held desk or forensic services). Reporting involves understanding the internal and external reporting requirements in terms of the content and timeliness of the reports. Recovery involves containment, restore, and eradication. Containment addresses how to control an incident before it spreads to avoid consuming excessive resources and increasing damage caused by the incident. Restore addresses bringing systems to normal operations and hardening systems to prevent similar incidents. Eradication addresses eliminating the affected components of the incident from the overall system to minimize further damage to the overall system. Remediation involves tracking and documenting security incidents on an ongoing basis.
190. Which of the following is
a. Rebuilding systems from scratch
b. Changing passwords
c. Preserving the evidence
d. Installing patches
191. Contrary to best practices, which of the following parties is usually
a. System administrator
b. Legal counsel
c. Disaster recovery coordinator