SNMP Versions

Baseline
QoS (Quality of Service)
6 Steps of Incident Response
Mix-n-Match
100

What does SNMP stand for?

Simple Network Management Protocol

100

What is a network baseline?

Record of the normal operating conditions

100

What does QoS stand for?

Quality of Service

100

What is the first step in the incident response process?

Identification, acknowledging that a security incident has occurred

100

How does the containment step in incident response differ between a low-level and a high-level security breach?

containment typically involves isolating affected systems and limiting access, while for high-level breaches, containment may require more extensive measures

200

Which SNMP version introduced encryption?

SNMPv3

200

Why is establishing a baseline important?

Identifying Anomalies, Troubleshooting, Capacity Planning, Performance Optimization, Security Monitoring

200

Name one method used to implement QoS.

Traffic shaping

200

What is the purpose of the containment step?

To limit the scope and impact of a security incident by preventing further spread or escalation.

200

What is the role of the Management Information Base (MIB)

a database that stores information about network devices and is used by SNMP agents to provide real-time data to the SNMP manager for monitoring and management purposes.

300

Describe a key difference between SNMP v1 and v3.

Security, authentication, encryption 

300

How often should a network baseline be reviewed?

From semi-annually to monthly based on the type of network

300

Why is QoS important for VoIP applications?

VoIP relies on real-time communication, and any degradation in network performance can significantly affect call quality

300

Describe the eradication step.

Completely removing the cause of the security incident, such as malware, vulnerabilities, or unauthorized access.

300

How does Traffic Shaping differ from Traffic Policing in terms of handling excess traffic in a network?

Traffic shaping buffers and delays excess traffic to conform to the defined rate, while traffic policing immediately drops or marks traffic that exceeds the rate limit, leading to potential packet loss.

400

What are the security features of SNMP v3?

Authentication, Privacy 

400

What tools can be used to establish a network baseline?

PRTG Network Monitor, Wireshark, Nagios SolarWinds NPM

400

Explain the difference between traffic shaping and traffic policing.

The major difference is that traffic shaping delays and buffers excess traffic to smooth it out, while traffic policing drops or marks excess traffic that exceeds the specified rate.

400

Why is the lessons learned step important?

it helps improve future incident response by analyzing the incident to identify what went well and what could be improved.

400

Why is it important to update a network baseline regularly, and what factors could necessitate frequent updates?

Regular updates to a network baseline are essential to reflect changes in network infrastructure

500

What are the main components of the SNMP architecture?

Managed Devices, SNMP Agents, SNMP Manager, Management Information Base

500

How can deviations from a network baseline be used to detect potential security threats  

Unusual Traffic Patterns, Unauthorized Device Connections, Abnormal Resource Usage, Strange Communication Behavior, Anomalous Login Attempts

500

How does congestion management in Quality of Service (QoS) techniques help maintain network performance during periods of high traffic?

Congestion management in QoS techniques prioritizes critical traffic, like VoIP or video, and controls the flow of less important traffic to prevent network overload, ensuring consistent performance even during high traffic periods.  

500

How do the six steps of incident response work together to ensure a comprehensive and effective response to a cybersecurity incident?


The six steps of incident response work together by systematically detecting, containing, and eliminating threats while recovering systems and ensuring future prevention. Each step builds on the previous one to minimize damage, improve response efficiency, and strengthen overall security for future incidents.



500

How can the lessons learned step in incident response contribute to a continuous improvement cycle for an organization's security posture, and what role does it play in refining the organization's risk management framework?

The lessons learned step helps identify systemic weaknesses in the organization's security policies, incident response procedures, and detection mechanisms. By incorporating insights from past incidents, it allows the organization to refine its risk management framework, enhance preventive measures, optimize response strategies, and update security training, ensuring a continuous improvement cycle that reduces the likelihood and impact of future incidents.