Deck 18: Incident Handling

Full screen (f)
exit full mode
Question
Organizations that handle and document incidents may be less likely to have repeat occurrences.
Use Space or
up arrow
down arrow
to flip the card.
Question
Defaced-page incidents result in loss of revenue, reputation, and morale of a company.
Question
Statistics reveal that most incidents of fraud involve "outside" individuals.
Question
The skills represented in an emergency response team always belong to the IT department.
Question
How one approaches incident detection can seriously impact the number and kinds of incidents that are detectable.
Question
The most common incidents that affect network security are attacks from malicious code and ____.

A)inside jobs
B)denial-of-service attacks
C)network flooding
D)password cracking
Question
This type of incident means an attacker has hacked your Web server.

A)Malicious code
B)Defaced pages
C)Errors and omissions
D)Fraud and theft
Question
____ attacks send a large quantity of packets to a server so that resources are overutilized.

A)Defaced pages
B)Intrusion
C)Errors and omissions
D)Denial-of-service
Question
____ attacks send input data of a greater size than the capacity of an unchecked variable in the server application.

A)Network flooding
B)Stack error
C)Buffer overflow
D)Errors and omissions
Question
____ tools record unusual activities performed by users, such as repeated attempts to connect to the server or attempts to access restricted resources.

A)System-monitoring
B)User-analysis
C)Network analysis
D)Log-analysis
Question
A(n) ____________________ in a computer-security environment is an event that tests the security solutions in place on a network or, in the case of a stand-alone machine, on that machine itself.
Question
____________________ is the most basic form of a DoS attack. Large numbers of requests are sent to the server. This results in the slowing down or failure of the network.
Question
____________________ tools monitor the events of attacks made on specific computers, such as password cracking or executing unauthorized programs.
Question
In UNIX and Linux, ____________________ is a dumping ground for automated CRON jobs, as well as various logged functions by applications that do not maintain their own log files.
Question
The chief difference between a worm and a virus is that ____________________ replicate in a network.
Question
What are some of the most common events that may indicate an attack in progress?
Question
What are some of the reasons to develop effective incident handling policies?
Question
What are some of the most common types of incidents that can occur on a network or a computer?
Question
What are the key phases of incident handling?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 18: Incident Handling
1
Organizations that handle and document incidents may be less likely to have repeat occurrences.
True
2
Defaced-page incidents result in loss of revenue, reputation, and morale of a company.
True
3
Statistics reveal that most incidents of fraud involve "outside" individuals.
False
4
The skills represented in an emergency response team always belong to the IT department.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
How one approaches incident detection can seriously impact the number and kinds of incidents that are detectable.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
The most common incidents that affect network security are attacks from malicious code and ____.

A)inside jobs
B)denial-of-service attacks
C)network flooding
D)password cracking
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
This type of incident means an attacker has hacked your Web server.

A)Malicious code
B)Defaced pages
C)Errors and omissions
D)Fraud and theft
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
____ attacks send a large quantity of packets to a server so that resources are overutilized.

A)Defaced pages
B)Intrusion
C)Errors and omissions
D)Denial-of-service
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
____ attacks send input data of a greater size than the capacity of an unchecked variable in the server application.

A)Network flooding
B)Stack error
C)Buffer overflow
D)Errors and omissions
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
____ tools record unusual activities performed by users, such as repeated attempts to connect to the server or attempts to access restricted resources.

A)System-monitoring
B)User-analysis
C)Network analysis
D)Log-analysis
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) ____________________ in a computer-security environment is an event that tests the security solutions in place on a network or, in the case of a stand-alone machine, on that machine itself.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ is the most basic form of a DoS attack. Large numbers of requests are sent to the server. This results in the slowing down or failure of the network.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
____________________ tools monitor the events of attacks made on specific computers, such as password cracking or executing unauthorized programs.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
In UNIX and Linux, ____________________ is a dumping ground for automated CRON jobs, as well as various logged functions by applications that do not maintain their own log files.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
The chief difference between a worm and a virus is that ____________________ replicate in a network.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
What are some of the most common events that may indicate an attack in progress?
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
What are some of the reasons to develop effective incident handling policies?
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
What are some of the most common types of incidents that can occur on a network or a computer?
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
What are the key phases of incident handling?
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 19 flashcards in this deck.