Incident Response Management

Apply attack methodology frameworks, perform incident response, and understand the incident management lifecycle to handle security incidents effectively.

5 minutes 5 Questions

Incident Response (IR) Management acts as the operational backbone for a Cybersecurity Analyst, providing a structured framework to address security breaches effectively. In the context of CompTIA CySA+, this process closely adheres to the NIST SP 800-61 lifecycle, comprising four distinct phases: …

Test mode:
CySA+ - Incident Response Management Example Questions

Test your knowledge of Incident Response Management

Question 1

An incident response team is performing eradication after discovering that attackers used compromised API keys to deploy malicious containers across a cloud environment. The team has revoked the compromised API keys, terminated malicious containers, and updated access control policies. Upon reviewing the eradication completeness, which additional action is essential to ensure thorough threat removal?

Question 2

A security team is eradicating a breach where attackers compromised an organization's DNS infrastructure to redirect traffic and intercept credentials. The team has identified and removed malicious DNS records, restored legitimate configurations, and flushed DNS caches across the network. Post-eradication analysis shows that several internal applications continue to resolve domain names incorrectly. Which overlooked eradication element is most likely causing this continued issue?

Question 3

A security analyst is processing a threat intelligence report detailing an adversary's use of 'Registry Run Keys' to ensure malware execution upon system reboot. When mapping this observation into the MITRE ATT&CK framework to distinguish the technical method from the adversary's broader strategic intent, which classification accurately categorizes the 'Registry Run Keys' entry within the hierarchy?

More Incident Response Management questions
417 questions (total)