ExamGecko
Question list
Search
Search

Related questions











Question 157 - 200-201 discussion

Report
Export

The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?

A.

Isolate the infected endpoint from the network.

Answers
A.

Isolate the infected endpoint from the network.

B.

Perform forensics analysis on the infected endpoint.

Answers
B.

Perform forensics analysis on the infected endpoint.

C.

Collect public information on the malware behavior.

Answers
C.

Collect public information on the malware behavior.

D.

Prioritize incident handling based on the impact.

Answers
D.

Prioritize incident handling based on the impact.

Suggested answer: C

Explanation:

According to the NIST Computer Security Incident Handling Guide, the next step in handling an event after confirming a potential indicator of compromise on an endpoint is to collect public information on the malware behavior. This step involves searching for information from various sources, such as antivirus vendors, security blogs, threat intelligence feeds, and online forums, to learn more about the characteristics, capabilities, and impact of the malware. This information can help the SOC team to identify the type, severity, and scope of the incident, as well as to determine the appropriate response actions and mitigation strategies. Isolating the infected endpoint, performing forensics analysis, and prioritizing incident handling are subsequent steps that follow after collecting public information on the malware behavior.Reference:

Computer Security Incident Handling Guide

SP 800-61 Rev. 2, Computer Security Incident Handling Guide

asked 07/10/2024
Matt Harrold
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first