SOLUTIONS
WhatvisvIncidentvResponse?v-vcorrectvanswer-
Thevactionsvtakenvstartingvfromvwhenvanvincidentvisvraisedvandvfollowingvitvthroughvtovco
mpletevremediationvasvwellvasvthevpostvincidentvassessments.
HowvDovWevDefinevAvComputervBreachvorvIntrusion?v-vcorrectvanswer-
Avcomputervbreachvcanvbevconsideredvasveithervanvintentionalvorvunintentionalvsituation
vwhichvaffectsvthevC.I.Avofvavcomputer.
GoalsvofvIncidentvResponsev-vcorrectvanswer-1.vPreparevforvthevinevitable
2.vIdentifyvthevIntrusion
3.vContainvthevthreat
4.vEradicatevthevthreat
5.vRemediatevthevintrusion
6.vDocumentvandvinvestigatevthevmethodsvusedvtovcreatevanvenvironmentvwherevthevsa
me/similarvattackvwillvfail
AccidentalvBreachvCausesv-vcorrectvanswer-1.vDatavTransportation
2.vMisconfiguredvSettings
3.vMisinterpretationvofvInstructions
4.vOSINT
5.vLossvofvData
6.vInsidervThreat
IntentionalvBreachvCausesv-vcorrectvanswer-1.vInsidervThreat
2.vPhishingvandvSpearvPhishing
, 3.vSocialvEngineering
4.vWateringvHoles/ExploitvKits
5.vSniffing
6.vCodevExploitation
7.vMisconfiguredvExploitation
8.vSQLvInjection
9.vPasswordvAttack
HowvArevBreachesvIdentified?v-vcorrectvanswer-1.vSecurityvTools
2.vSuspiciousvActivityvNoted
3.vSOC
4.vRansoms
5.vPublicvDatavLeaks
DefinitionvofvGovernancev-vcorrectvanswer-
Thevestablishmentvofvpoliciesvandvcontinuousvmonitoringvofvtheirvpropervimplementatio
n,vbyvthevmembersvofvthevgoverningvbodyvofvanvorganisation.
WhyvDovWevNeedvGovernance?v-vcorrectvanswer-
Seniorvleadershipvsupportvisvcrucialvandvreducesvresistancevtovchangesvandvsavesvtime
.
IncidentvResponsevWorkflowv-vcorrectvanswer-1.vCrestv-vPrepare,vRespond,vFollowvUP
2.vSANSv-vPrep,vIdentify,vContain,vEradicate,vRecover,vLessonvLearnt
3.vNISTv-vPrep,vDetectionv&vAnalysis,vContain-Eradicatev&vRecovery
IncidentvResponsevPlanv1v-vcorrectvanswer-1.vRolesvandvResponsibilities
2.vDependantvonvOrganisation
3.vCorporatevLevelvBuyvInv-vUltimatelyvresponsible
4.vGovernancevRequirements
IncidentvResponsevPlanv2v-vcorrectvanswer-1.vIncidentvResponsevManagerv/vTeam
2.vGeographicvLocationsv-vlocalvpointvofvcontact
3.vDocumentationv-vWhovdoesvwhatvandvwhen
4.vCommunicationsv-vInformingvrelevantvorganisations
5.vSeverityvLevelvvvResponsevLevel
ItemsvFoundvinvavGrabvBagv-vcorrectvanswer-1.vHardware
2.vSoftware
3.vDocuments
4.vToiletries