- Detection
- Recovery
- Discovery
- Analysis
Q: An organization is completing its annual compliance audit. The people
performing the audit have access to any relevant information, including records
and documents. Which documentation benefit does this scenario outline?
- Transparency
- Accuracy
- Organization
- Consistency
Explanation: The use of transparent documentation ensures that auditors have access to all pertinent information, enabling them to carry out their audit efficiently and verify that the organization is in conformity with legislation and standards.
Q: An organization is working on implementing a new security tool, and a
security analyst has been tasked with developing workflow documentation that
outlines the process for using the tool. Which documentation benefit does this
scenario outline?
- Quality
- Standardization
- Transparency
- Clarity
Q: A member of the forensics department of an organization receives a
computer that requires examination. On which part of the chain of custody form
should they sign their name and write the date?
- Custody log
- Description of the evidence
- Purpose of transfer
- Evidence movement
Q: Which statement best describes the functionality of automated
playbooks?
- They use automation to execute tasks and response actions.
- They require the combination of human intervention and automation to execute tasks.
- They require the use of human intervention to execute tasks.
- They use a combination of flowcharts and manual input to execute tasks and response actions.
Q: What are the steps of the triage process in the correct order?
- Assign priority, receive and assess, collect and analyze
- Receive and assess, assign priority, collect and analyze
- Receive and assess, collect and analyze, assign priority
- Collect and analyze, assign priority, receive and assess
Q: What are the steps of the third phase of the NIST Incident Response
Lifecycle? Select three answers.
- Containment
- Response
- Eradication
- Recovery
Q: Which step of the NIST Incident Response Lifecycle involves returning
affected systems back to normal operations?
- Recovery
- Response
- Eradication
- Containment
Q: Two weeks after an incident involving ransomware, the members of an
organization want to review the incident in detail. Which of the following
actions should be done during this review? Select all that apply.
- Determine the person to blame for the incident.
- Create a final report.
- Determine how to improve future response processes and procedures.
- Schedule a lessons learned meeting that includes all parties involved with the security incident.
Q: What does a final report contain? Select three.
- Timeline
- Recommendations
- Incident details
- Updates
Q: In the NIST Incident Response Lifecycle, what is the term used to
describe the prompt discovery of security events?
- Validation
- Preparation
- Detection
- Investigation
Q: Which of the following does a semi-automated playbook use? Select
two.
- Threat intelligence
- Automation
- Human intervention
- Crowdsourcing
Q: Fill in the blank: Eradication is the complete _____ of all the
incident elements from affected systems.
- prevention
- disconnection
- removal
- isolation
Q: Chain of custody documents establish proof of which of the
following? Select two answers.
- Quality
- Reliability
- Integrity
- Validation
Q: After a security incident involving an exploited vulnerability due
to outdated software, a security analyst applies patch updates. Which of the
following steps does this task relate to?
- Prevention
- Response
- Eradication
- Reimaging
16. Fill in the blank: A lessons learned meeting should be held within
____ weeks of an incident.
- two
- three
- four
- five
Q: Which documentation provides a comprehensive review of an incident?
- Lessons learned meeting
- Timeline
- Final report
- New technology
Q: What are the benefits of documentation during incident response?
Select three answers.
- Quality
- Standardization
- Transparency
- Clarity
Q: Fill in the blank: Inconsistencies in the collection and logging of
evidence cause a _____ chain of custody.
- broken
- missing
- secure
- forensic
Q: Fill in the blank: Containment is the act of limiting and _____
additional damage caused by an incident.
- preventing
- eradicating
- removing
- detecting
Explanation: The act of minimizing and avoiding further harm produced by an occurrence is what is often referred to as containment.