What is the inciden...
 
Notifications
Clear all

What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?

1 Posts
1 Users
0 Likes
158 Views
 Tuan
(@shippertuan)
Posts: 713
Noble Member
Topic starter
 

Attacker Lauren has gained the credentials of an organization's internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited.

What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?

  • A . Preparation
    B. Eradication
    C. Incident recording and assignment
    D. Incident triage

Show Answer Hide Answer

Suggested Answer: D

Explanation:

Triage is that the initial post-detection incident response method any responder can execute to open an event or false positive. Structuring an efficient and correct triage method can reduce analyst fatigue, reduce time to reply to and right incidents, and ensure that solely valid alerts are promoted to “investigation or incident” status.

Every part of the triage method should be performed with urgency, as each second counts once in the inside of a crisis. However, triage responders face the intense challenge of filtering an unwieldy input supply into a condensed trickle of events. Here are some suggestions for expediting analysis before knowledge is validated:

✑ Organization: reduce redundant analysis by developing a workflow that may assign tasks to responders. Avoid sharing an email box or email alias between multiple responders. Instead use a workflow tool, like those in security orchestration, automation, and response (SOAR) solutions, to assign tasks. Implement a method to re-assign or reject tasks that are out of scope for triage.

✑ Correlation: Use a tool like a security info and even management (SIEM) to mix similar events. Link potentially connected events into one useful event.

✑ Data Enrichment: automate common queries your responders perform daily, like reverse DNS lookups, threat intelligence lookups, and IP/domain mapping. Add this knowledge to the event record or make it simply accessible.

Moving full speed ahead is that the thanks to get through the initial sorting method however a a lot of detailed, measured approach is necessary throughout event verification. Presenting a robust case to be accurately evaluated by your security operations center (SOC) or cyber incident response team (CIRT) analysts is key. Here are many tips for the verification:

✑ Adjacent Data: Check the data adjacent to the event. for example, if an end has a virus signature hit, look to visualize if there’s proof the virus is running before career for more response metrics.

✑ Intelligence Review: understand the context around the intelligence. simply because an ip address was flagged as a part of a botnet last week doesn’t mean it still is an element of a botnet today.

✑ Initial Priority: Align with operational incident priorities and classify incidents appropriately. ensure the right level of effort is applied to every incident.

✑ Cross Analysis: look for and analyze potentially shared keys, like science addresses or domain names, across multiple knowledge sources for higher knowledge acurity.
 
Posted : 02/11/2022 12:14 am
Topic Tags

Latest EC-Council 312-50v12 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: