100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SANS FOR508 Exam Questions and Answers 100% Pass

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
02-02-2025
Written in
2024/2025

SANS FOR508 Exam Questions and Answers 100% Pass Dwell Time - The time an attacker has remained undetected within a network. An important metric to track as it directly correlates with the ability of an attacker to accomplish their objectives. Breakout Time - Time is takes an intruder to begin moving laterally once they have an initial foothold in the network. Main Threat Actors - APT (Nation State Actors) Organized Crime Hacktivists NIST - US National Institute for Standards and Technology Six-Step Incident Response Process - 1: Preparation 2: Identification 3: Containment and Intelligence Development 4: Eradication and Remediation 2Brittie Donald, All Rights Reserved © 2025 5: Recovery 6: Follow-up Six-Step - Preparation - Incident response methodologies emphasize preparation-not only establishing a response capability so the organization is ready to respond to incidents but also preventing incidents by ensuring that systems, networks, and applications are sufficiently secure. Six-Step - Identificatoin - Identification is triggered by a suspicious event. This could be from a security appliance, a call to the help-desk, or the result of something discovered via threat hunting. Event validation should occur and a decision made as to the severity of the finding (not valid events lead to a full incident response). Once an incident response has begun, this phase is used to better understand the findings and begin scoping the network for additional compromise. Six Step - Containment and Intelligence development - In this phase, the goal is to rapidly understand the adversary and begin crafting a containment strategy. Responders must identify the initial vulnerability or exploit, how the attackers are maintaining persistence and laterally moving in the network, and how command and control is being accomplished. in conjunction with the previous scoping phase, responders will work to have a complete picture of the attack and often implement changes to the environment to increase host and network visibility. Threat intelligence is one of the key products of the IP team during this phase. 3Brittie Donald, All Rights Reserved © 2025 Six Step - Eradication and Remediation - Arguably the most important phase of the process, eradication aims to remove the threat and restore business operations to a normal state. However, successful eradication cannot occur until the full scop of the intrusion is understood. A rush to this phase usually results in failure. Remediation plans are developed, and recommendations are implemented in a planned and controlled manner. Ex. Include -Block malicious IP addresses -Blackhole malicious domain names -Rebuild compromised systems -Coordinate with cloud and service providers -Enterprise-wide password changes -Implementation validation Recovery - Recovery leads the enterprise back to day-to-day business. The organization will have learned a lot during the incident

Show more Read less
Institution
SANS 508
Course
SANS 508









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS 508
Course
SANS 508

Document information

Uploaded on
February 2, 2025
Number of pages
13
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS FOR508 Exam Questions and
Answers 100% Pass


Dwell Time - ✔✔The time an attacker has remained undetected within a network. An

important metric to track as it directly correlates with the ability of an attacker to

accomplish their objectives.


Breakout Time - ✔✔Time is takes an intruder to begin moving laterally once they have

an initial foothold in the network.


Main Threat Actors - ✔✔APT (Nation State Actors)


Organized Crime


Hacktivists


NIST - ✔✔US National Institute for Standards and Technology


Six-Step Incident Response Process - ✔✔1: Preparation


2: Identification


3: Containment and Intelligence Development


4: Eradication and Remediation



Brittie Donald, All Rights Reserved © 2025 1

, 5: Recovery


6: Follow-up


Six-Step - Preparation - ✔✔Incident response methodologies emphasize preparation-not

only establishing a response capability so the organization is ready to respond to

incidents but also preventing incidents by ensuring that systems, networks, and

applications are sufficiently secure.


Six-Step - Identificatoin - ✔✔Identification is triggered by a suspicious event. This could

be from a security appliance, a call to the help-desk, or the result of something

discovered via threat hunting. Event validation should occur and a decision made as to

the severity of the finding (not valid events lead to a full incident response). Once an

incident response has begun, this phase is used to better understand the findings and

begin scoping the network for additional compromise.


Six Step - Containment and Intelligence development - ✔✔In this phase, the goal is to

rapidly understand the adversary and begin crafting a containment strategy.

Responders must identify the initial vulnerability or exploit, how the attackers are

maintaining persistence and laterally moving in the network, and how command and

control is being accomplished. in conjunction with the previous scoping phase,

responders will work to have a complete picture of the attack and often implement

changes to the environment to increase host and network visibility. Threat intelligence

is one of the key products of the IP team during this phase.



Brittie Donald, All Rights Reserved © 2025 2

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BrittieDonald Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
399
Member since
2 year
Number of followers
162
Documents
20443
Last sold
4 days ago
BrittieDonald Study Solutions.

Get Help in Your Due Online and Actual Exams, Assignments with Well Researched and Up-to date Study Materials for Guaranteed Success

3.3

81 reviews

5
33
4
13
3
7
2
5
1
23

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions