ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 30 - 312-40 discussion

Report
Export

An organization, PARADIGM PlayStation, moved its infrastructure to a cloud as a security practice. It established an incident response team to monitor the hosted websites for security issues. While examining network access logs using SIEM, the incident response team came across some incidents that suggested that one of their websites was targeted by attackers and they successfully performed an SQL injection attack.

Subsequently, the incident response team made the website and database server offline. In which of the following steps of the incident response lifecycle, the incident team determined to make that decision?

A.
Analysis
Answers
A.
Analysis
B.
Containment
Answers
B.
Containment
C.
Coordination and information sharing
Answers
C.
Coordination and information sharing
D.
Post-mortem
Answers
D.
Post-mortem
Suggested answer: B

Explanation:

The decision to take the website and database server offline falls under the Containment phase of the incident response lifecycle. Here's how the process typically unfolds:

1.Detection: The incident response team detects a potential security breach, such as an SQL injection attack, through network access logs using SIEM.

1.Analysis: The team analyzes the incident to confirm the breach and understand its scope and impact.

1.Containment: Once confirmed, the team moves to contain the incident to prevent further damage. This includes making the affected website and database server offline to stop the attack from spreading or causing more harm1.

1.Eradication and Recovery: After containment, the team works on eradicating the threat and recovering the systems to normal operation.

1.Post-Incident Activity: Finally, the team conducts a post-mortem analysis to learn from the incident and improve future response efforts.

Reference: The containment phase is critical in incident response as it aims to limit the damage of the security incident and isolate affected systems to prevent the spread of the attack12. Taking systems offline is a common containment strategy to ensure that attackers can no longer access the compromised systems1.

asked 18/09/2024
Daniel Silva
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first