Question: Instructions : Watch the archived webinar shown below and answer the questions listed below. Your answers should be complete, but brief. NOTE: Glossary at the

Instructions:

Watch the archived webinar shown below and answer the questions listed below. Your answers should be complete, but brief. NOTE: Glossary at the end. NOTE: The webinar gets technical after slide 21stick with it. Focus on high-level, cursory understanding after that.

https://www.fireeye.com/blog/threat-research/2014/02/qa-webinar-followup-fresh-prints-malware-network-danger.html

Fresh Prints of Mal-ware: A Lively Analysis of Live Response

Original Date: August 29, 2013 ET

What questions does live response answer?

What are the stated benefits of live response? (early/later in webinar not on all one slide)

In the case study involving 10,000 systems and 30 compromised systems, how did live response help focus investigative efforts on 6 systems needing analysis? What do you think happens with other 24 systems?

When is live response NOT a good idea?

What are the basic steps to perform live response?

What are the challenges when collecting data during triage?

Why do you think What data did the attacker take? is the most frequent question clients ask live response and forensics experts?

What are some conceptual, general approaches incident responders use identify whether data was stolen and/or what data was stolen?

Why is it important to determine what lateral movement occurred?

List and briefly explain the keys to live response success outlined at the end of the webinar.

Glossary:

Backdoor: A hidden way for the bad guy to get back into a system

C2: Command and control

Compromised: Hacked

Domain controller: A server on a Windows network that authenticates users logging in

Ephemeral: Transient; does not persist

Event log (EVT log): System log on Windows that logs user, system, and application activity

Hostname: Computer name (not IP address) (e.g. BBlaptop)

Live response: Analyzing a computer while its running

Metadata: Data about data (date/time stamp of a file, rather than the content of the file)

Move laterally (lateral move, LR): Bad guy jumps to another system from one compromised system

PW dump: A program that will copy the password file on a system

RAR file: Compressed file, or archive of files (RAR format, rather than .ZIP or some other compression)

Registry: A set of files on a Windows system that stores A TON of system info

Script: Program that is quickly written, doesnt need to be compiled, and automates tasks

Shell: Command prompt interface to the operating system

Slack space: Space at the end of a file that contains data of the file that used to be stored there

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!