Preview

Quiz Week 5

Satisfactory Essays
Open Document
Open Document
381 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Quiz Week 5
Quiz Week 5
Victor Sabani
ITT Technical Institute

Quiz Week 5
Quiz Questions
1. What is the purpose of a CIRT plan? Describe what this plan does and what other plan it ties into.
The purpose of the CIRT plan is to identify which group is responsible for what. It also provides information for the DRP.
2. Describe what the three models are for a CIRT plan based on the NIST SP 800-61 template.
Critical incident response team, Distributed incident response teams, and the Coordinating team
3. Define three of the responsibilities that an Incident Response Team would have. List them and describe the responsibilities.
Develop Responsibilities generic procedures to respondto an incedent, determine cuase of incident determine best response to an incident, and protect collected evidence, to ensure that there is noo tampering of evidence.
4. As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users.
File sharing P2P, access web sites that are prohibited, purposely do things not supposed to according to the AUP, and spam coworkers.
5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.
You can enable firewalls to block ports, have up to date AV software, reduce the attack surface disabling services not used/.
6. Define a DRP and explain when it is invoked.
A DRP according to the book is a plan of what to do when something happens. It is invoked after a incident.
7. Describe two CSFs for a DRP.
Two CSFs for a DRP are management support, a disaster recovery budget.
8. Explain what Recovery Time Objective (RTO) is and why the DRP needs to be written to meet it.
A RTO is the time needed to recover a system, so the MAO can be accurate.
9. Describe the advantages and disadvantages for each of the DRP location possibilities.
A Cold site is cheap, a warm site is not to expensive to maintain, and a hot siteis the easiest to test.
10. List and describe

You May Also Find These Documents Helpful

  • Satisfactory Essays

    reveal any vulnerabilities. 2. What is the difference between the disaster recovery plan (DRP) and a business continuity…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Is4680 Week 1 Lab Executive Summery Lab #2: Executive Summary Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).…

    • 630 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    You will learn to successfully identify inappropriate activity on a network and to develop a basic AUP that describes the handling of such incidents.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    8. Explain what Recovery Time Objective (RTO) is and why the DRP needs to be written to meet it.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    2 Describe what the three models are for a CIRT plan based on the NIST SP 800-61 template.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. Is creating redundancy for systems such as Active Directory or Web servers a part of the DRP or…

    • 246 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Disaster Recovery Plan Paper Fernando Hernandez IT244/Axia College Introduction In this assignment, I will go over the different items related to the disaster recovery plan. I will go over the purpose of the plan, explain the key elements that go into a plan, the methods of testing the plan, and why we test the plan. All while explaining why the disaster recovery plan is so critical to businesses in the event of an emergency.…

    • 665 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bsbwor501A - Assessment

    • 1439 Words
    • 6 Pages

    | Q2: Explain “meaningful and achievable objectives of a project”. Please give 1 example of each.…

    • 1439 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    a. Enforce encryption, and VPN tunneling for remote connections b. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays