SNMP
Baseline
Quality of Service
6 Steps of Incident Response
100

What is the acronym for SNMP?

Simple Network Management Protocol

100

Definition of baseline?

A baseline is a report of the network’s normal state of operation and might include a range of acceptable measurements

100

What is the acronym for QoS?

Quality of Service
100

In the incident response process, what is the first step?

Preparation

200

Which version of SNMP added encryption?

SNMP Version 3

200

What is the importance of creating a baseline?

It provides a starting point for measuring and improving an organization's security posture

200

Give an example of a QoS implementation technique.

Traffic Shaping

200

What is the importance of the containment step?

To limit the spread of a problem or threat.

300

What is an important difference between version 1 of SNMP and version 3?

SNMP v1 is the original version and is rarely used today while SNMP 3 has advanced security mechanisms like authentication and encryption

300

How frequently should a network baseline be examined?

A network baseline should be examined regularly, ideally each month.

300

For VoIP applications, what is the importance of QoS?

Prioritizes voice traffic on a network, ensuring smooth and clear phone calls by minimizing issues like packet loss, latency, and jitter.

300

Explain what the eradication step is.

The root cause of a security breach is completely removed from a system or network.

400

What is an important security feature for SNMP version 3?

Adds authentication, validation, and encryption for messages exchanged between managed devices and the network management console.




400

What resources are available for creating a network baseline?

Network monitoring platforms, packet capture analyzers, flow analysis tools, SNMP, performance testing tools, and dedicated network baseline software.

400

What is the difference between traffic shaping and traffic policing?

Traffic shaping actively buffers and delays excess packets to smooth out the traffic flow, while traffic policing drops packets that exceed a set rate limit, resulting in a more immediate response.

400

Explain the importance of the lessons learned step.

It helps organizations review past incidents, find weaknesses in their security, and make changes to avoid future issues.