Security QBank
Security QBank
A. Preparation
B. Recovery
C. Implementation
D. Detection and Analysis
Answer: C
A. Malware analysis
B. Formulating an incident response team
C. Restoring affected systems
D. Blocking unauthorized IP addresses
Answer: B
A. Preparation
B. Detection and Analysis
C. Eradication
D. Recovery
Answer: B
A. Velociraptor
B. GRR
C. Wireshark
D. Sysinternals
Answer: C
8. What should be done first when acquiring data for forensic analysis?
A. GRR
B. Velociraptor
C. Cyber Kill Chain
D. NIST
Answer: B
A. By physical location
B. By logical levels such as network perimeter, host perimeter, host-level, and application-level
C. By service types
D. By hardware specifications
Answer: B
A. SHA-3
B. MD-5
C. SHA-2
D. None of the above
Answer: B
A. Identify vulnerabilities
B. Restore affected systems to operational status
C. Monitor ongoing threats
D. Perform training for incident responders
Answer: B
A. Task Manager
B. netstat -nao
C. lsof -i
D. sc query
Answer: D
A. Velociraptor
B. Canarytokens
C. Wireshark
D. GRR
Answer: B
A. Secure backups
B. Restore systems
C. Eliminate all attacker artifacts and improve defenses
D. Analyze network performance
Answer: C
A. Network-based detection
B. Host-based detection
C. Application-level detection
D. Behavioral analysis
Answer: D
A. Hard disk
B. RAM
C. Archived logs
D. Backups
Answer: B
A. Training employees
B. Monitoring all network traffic
C. Responding to security incidents
D. Creating security policies
Answer: C
A. GRR
B. Task Manager
C. Apache logs
D. Netcat
Answer: A
A. Analyze evidence
B. Identify gaps and improve processes
C. Restore operations
D. Notify legal authorities
Answer: B
A. Backup restoration
B. Identifying and removing malware artifacts
C. Analyzing network performance
D. Generating user activity logs
Answer: B
35. What is the main focus of the detection and analysis phase?
A. ps aux
B. tasklist
C. netstat
D. sc query
Answer: B
A. Eradication
B. Containment
C. Recovery
D. Detection
Answer: C
A. lsof
B. tasklist
C. Velociraptor
D. sc query
Answer: A
A. RAM
B. CPU registers
C. Hard disk
D. Temporary cache files
Answer: C
A. Detection
B. Eradication
C. Containment
D. Preparation
Answer: C
Answer: True
Answer: False
Answer: True
Answer: True
5. An incident response team does not need to be trained during the preparation phase.
Answer: False
Answer: True
Answer: True
8. RAM is a volatile data source that should be acquired first during data collection.
Answer: True
Answer: True
Answer: True
Answer: False
12. Networks can be categorized for detection purposes into logical levels like network
perimeter, host perimeter, and application-level.
Answer: True
13. MD-5 is considered a secure hashing method.
Answer: False
14. The recovery phase involves restoring affected systems to operational status.
Answer: True
Answer: True
Answer: True
Answer: True
18. The first step when responding to a detected incident is isolating the system.
Answer: False
19. The Cyber Kill Chain model highlights the stages of an attacker's methodology.
Answer: True
Answer: False
21. Canarytokens are used to alert teams when malicious files are accessed.
Answer: True
22. The eradication phase includes removing malware artifacts and improving defenses.
Answer: True
23. Recovery involves monitoring systems for re-compromise after restoring them.
Answer: True
24. Detection at the host level involves monitoring application logs only.
Answer: False
Answer: True
26. The incident contact list is an essential document during the preparation phase.
Answer: True
Answer: False
Answer: False
Answer: True
Answer: True
Answer: True
Answer: True
33. Post-incident reports focus solely on mistakes made during response efforts.
Answer: False
Answer: True
Answer: True
Answer: False
Answer: True
38. Detection of a spike in network traffic at specific ports may indicate perimeter intrusion.
Answer: True
39. Containment and eradication are part of the preparation phase.
Answer: False
40. Static acquisition focuses on data that will not change after a system reboot.
Answer: True
41. Post-incident analysis does not require input from affected business units.
Answer: False
Answer: True
Answer: False
Answer: True
Answer: True
Answer: False
47. The goal of long-term containment is to secure systems while business operations
continue.
Answer: True
Answer: True
Answer: True
Answer: False
Answer: False
52. NIST guidelines are the basis for many incident handling processes.
Answer: True
Answer: True
Answer: False
Answer: True
Answer: False
Answer: True
58. The Cyber Kill Chain provides guidelines for securing software.
Answer: False
Answer: True
Answer: True
61. Containment ensures the attacker can no longer access the system.
Answer: True
Answer: True
Answer: False
64. Logs from intrusion detection systems (IDS) are analyzed during detection and analysis.
Answer: True
65. Unauthorized system changes should trigger immediate incident response.
Answer: True
66. Linux tools like lsof are used for monitoring network activity.
Answer: True
Answer: True
Answer: False
69. Containment should involve business unit approval for system isolation.
Answer: True
70. Incident response frameworks are designed to prevent future attacks entirely.
Answer: False