<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Incident Response in Exam Preparation</title>
    <link>https://community.isc2.org/t5/Exam-Preparation/Incident-Response/m-p/40277#M3290</link>
    <description>Thanks for your reply and explanation Much appreciated.</description>
    <pubDate>Mon, 26 Oct 2020 20:56:05 GMT</pubDate>
    <dc:creator>Nitesh</dc:creator>
    <dc:date>2020-10-26T20:56:05Z</dc:date>
    <item>
      <title>Incident Response</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Incident-Response/m-p/40228#M3286</link>
      <description>&lt;P&gt;Dear Experts&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am new to this community and i am preparing for CISSP exam.&lt;/P&gt;&lt;P&gt;During my preparation i have come across below question in one of the practise test and will require you expert input.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When any intrusion is detected what should be your first step?&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="form-checkbox fpt-option "&gt;a) Eliminate all means of intruder access&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;b) Contain the intrusion&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;c) Determine to what extent systems and data are compromised&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;&lt;SPAN&gt;d) Communicate with relevant parties&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;&lt;SPAN&gt;According to me, the best answer should be option c) as after incident detection our first step to respond by analysing and documenting/verify the impact of the incident and then we go for mitigation and containment of the incident.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;&lt;SPAN&gt;Appreciate you inputs here&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;&lt;SPAN&gt;Nitesh&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="form-checkbox fpt-option "&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sun, 25 Oct 2020 23:34:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Incident-Response/m-p/40228#M3286</guid>
      <dc:creator>Nitesh</dc:creator>
      <dc:date>2020-10-25T23:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Incident-Response/m-p/40252#M3288</link>
      <description>&lt;P&gt;I'm not an expert either, well a little bit, but I would always take action first to prevent further damage, first stop the bad thing from doing further bad things asap, like hospital's triage you first stop the bleeding, first contain the problem. First containment / isolation of problem, than you can take your time to watch, think, and analyze as much as you like, untill you find out for sure what has exactly happened (what further systems are breached / damaged, etc) and what can you do to remediate the problem, take mitigation actions to prevent this incident happening again, and try to recover from the situation, back to normal operations.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 15:47:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Incident-Response/m-p/40252#M3288</guid>
      <dc:creator>rjduin</dc:creator>
      <dc:date>2020-10-26T15:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Incident-Response/m-p/40269#M3289</link>
      <description>&amp;gt; Nitesh (Viewer) posted a new topic in Exam Preparation on 10-25-2020 07:34 PM in the (ISC)Â² Community :&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Dear Experts&lt;BR /&gt;&lt;BR /&gt;Oh, I should shut up, then ...&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;nbsp; &amp;nbsp; When any intrusion is detected what should be your first step?&lt;BR /&gt;&lt;BR /&gt;Well, the first step is the most important, so:&lt;BR /&gt;&lt;BR /&gt;&amp;gt; a) Eliminate all means of intruder access&lt;BR /&gt;&lt;BR /&gt;Eliminating all means of intruder access probably means eliminating all means of&lt;BR /&gt;access for everyone, which is a good way to DoS yourself, so probably not a good&lt;BR /&gt;idea.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; b) Contain the intrusion&lt;BR /&gt;&lt;BR /&gt;My choice. Limit the damage. *Then* take stock.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; c) Determine to what extent systems and data are compromised&lt;BR /&gt;&lt;BR /&gt;Good, but ...&lt;BR /&gt;&lt;BR /&gt;&amp;gt; d) Communicate with relevant parties&lt;BR /&gt;&lt;BR /&gt;Can be left until later, and probably needs to be run by PR and legal beforehand,&lt;BR /&gt;anyway.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; According to me, the best answer should be option c) as after incident&lt;BR /&gt;&amp;gt; detection our first step to respond by analysing and documenting/verify the&lt;BR /&gt;&amp;gt; impact of the incident and then we go for mitigation and containment of the&lt;BR /&gt;&amp;gt; incident.&lt;BR /&gt;&lt;BR /&gt;Yeah, we need to do that analysis, and it is important, but the first thing is to limit&lt;BR /&gt;the damage, so, b.&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
      <pubDate>Mon, 26 Oct 2020 19:08:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Incident-Response/m-p/40269#M3289</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-10-26T19:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Incident-Response/m-p/40277#M3290</link>
      <description>Thanks for your reply and explanation Much appreciated.</description>
      <pubDate>Mon, 26 Oct 2020 20:56:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Incident-Response/m-p/40277#M3290</guid>
      <dc:creator>Nitesh</dc:creator>
      <dc:date>2020-10-26T20:56:05Z</dc:date>
    </item>
  </channel>
</rss>

