SNMP, Yes Please!
(SNMP Versions)
Quality > Quantity
Base by Base, Line by line
(Baseline)
Wreck & Respond
(6 Step Incident Response)
100

This is the protocol that the acronym "SNMP" represents.

What is the Simple Network Management Protocol?

100

It is the protocol "Quality of Service" that makes up this 3-letter acronym.

What is QoS?

100

A collection of metrics that represent a networks foundation or normal condition.

What is a Network Baseline?

100

This is the first step in the incident response process.

What is Preparation?

200

It is this SNMP Version that introduced encryption.

What is SNMPv3 (Version 3)?

200

This method used to implement QoS assigns network traffic different priority levels to ensure critical apps receive better treatment.

What is Priority Queuing?

200

It allows for assessment of performance compared to a baseline. 

What is establishing a baseline?

200

limiting the spread of security breach by isolating the affected system or network segment is the purpose of this step in the incident response.

What is the Containment Step?

300

It is this key improvement that makes SNMP Version 3 safer than SNMP Version 1.

What are Security features?

300

QoS is crucial for this application because it prioritizes voice packets over other network traffic.

What is VoIP applications?

300

A network baseline should be reviewed about this many times per year.

What is 4 times a year?

300

This step involves completely removing the malicious code or threat from a compromised system.

What is the Eradication step?

400
The 3 security features of SNMPv3 that help verify message source, protect data in transit, and ensure a packet hasn't been altered.

What is Authentication, Encryption, and Message Integrity?

400

delaying packets and actively buffering or dropping packets and not buffering is the difference between these two traffic patterns.

What is traffic shaping and traffic policing?

400

These tools can be used to establish a network baseline.

What is Network Monitoring Platforms (NMPs)?

400

Allowing organizations to analyze the incident response process after a security breach and identify weak points is what makes this step important.

What is the Lesson Learned step?