Incident Response Management

Apply attack methodology frameworks, perform incident response, and understand the incident management lifecycle to handle security incidents effectively.

Covers attack methodology frameworks including cyber kill chains, diamond model of intrusion analysis, MITRE ATT&CK, OSSTMM, and OWASP testing guide. Includes performing incident response activities such as detection, analysis, containment, eradication, and recovery. Also covers the incident management life cycle including incident response plans, tools, playbooks, tabletop exercises, training, business continuity, disaster recovery, forensic analysis, and root cause analysis.
5 minutes 5 Questions

Incident Response (IR) Management acts as the operational backbone for a Cybersecurity Analyst, providing a structured framework to address security breaches effectively. In the context of CompTIA CySA+, this process closely adheres to the NIST SP 800-61 lifecycle, comprising four distinct phases: …

Concepts covered: Cyber Kill Chain framework, Diamond Model of Intrusion Analysis, MITRE ATT&CK framework, OSSTMM (Open Source Security Testing Methodology), OWASP Testing Guide, Incident detection and identification, Incident analysis and triage, Containment strategies, Eradication procedures, Recovery and restoration, Evidence preservation and chain of custody, Incident response plan development, Incident response tools and technologies, Playbooks and runbooks, Tabletop exercises, Incident response training, Business continuity planning, Disaster recovery procedures, Digital forensic analysis, Root cause analysis techniques, Post-incident review and lessons learned

Test mode:
CySA+ - Incident Response Management Example Questions

Test your knowledge of Incident Response Management

Question 1

An incident response team is performing eradication after discovering that attackers used compromised API keys to deploy malicious containers across a cloud environment. The team has revoked the compromised API keys, terminated malicious containers, and updated access control policies. Upon reviewing the eradication completeness, which additional action is essential to ensure thorough threat removal?

Question 2

A security team is eradicating a breach where attackers compromised an organization's DNS infrastructure to redirect traffic and intercept credentials. The team has identified and removed malicious DNS records, restored legitimate configurations, and flushed DNS caches across the network. Post-eradication analysis shows that several internal applications continue to resolve domain names incorrectly. Which overlooked eradication element is most likely causing this continued issue?

Question 3

A security analyst is processing a threat intelligence report detailing an adversary's use of 'Registry Run Keys' to ensure malware execution upon system reboot. When mapping this observation into the MITRE ATT&CK framework to distinguish the technical method from the adversary's broader strategic intent, which classification accurately categorizes the 'Registry Run Keys' entry within the hierarchy?

More Incident Response Management questions
421 questions (total)