Incident Response Process
Incident Analysis
Digital Forensics
Data Sources & Monitoring
Incident Handling Tools
100

This is the first phase of the incident response lifecycle

What is Preparation?

100

This type of analysis examines patterns and trends over time.

What is Trend analysis?

100

This ensures evidence has not been altered during handling.

What is Chain of custody?

100

This system aggregates logs for centralized analysis.

What is a SIEM (Security Information and Event Management)?


100

A tool used to detect unauthorized changes to files.

What is File integrity monitoring (FIM)?

200

This phase focuses on limiting damage during an attack.

What is Containment?

200

This type of attack involves generating excessive traffic to overwhelm a system.

What is a Denial of Service (DoS) attack?

Digital Forensics

200

A duplicate of data created for analysis without altering the original.

What is a Forensic image?

200

Logs from routers, switches, and firewalls fall under this category.

What are Network logs?

200

This tool captures and analyzes network traffic.

What is a Protocol analyzer (e.g., Wireshark)?

300

This phase removes the root cause of an incident.

What is Eradication?

300

The practice of identifying unusual behavior compared to a baseline.

What is Behavioral analysis?

300

What is Behavioral analysis?

What is Non-volatile data?

300

Systems that monitor endpoints for malicious activity.

What is EDR (Endpoint Detection and Response)?

300

This tool automates incident detection and response workflows.

What is SOAR (Security Orchestration, Automation, and Response)?

400

This phase ensures systems are safely restored to operation.

What is Recovery?

400

A technique used to analyze malware behavior in a safe environment.

What is Sandboxing?


400

This provides a mathematical value to verify data integrity.

What is Hashing?

400

Logs generated by applications such as databases and web servers.

What are Application logs?

400

This tool correlates data from multiple sources to identify threats.

What is a SIEM correlation engine?

500

he final phase where improvements are documented and implemented.

What is Post-incident activity (Lessons learned)?

500

An attack where an adversary maintains long-term access.

What is an Advanced Persistent Threat (APT)?

500

RAM analysis is critical because this type of data is quickly lost.

What is Volatile memory?

500

A deception technology used to lure attackers.

What is a Honeypot?

500

This identifies known malicious patterns using signatures.

What is an IDS/IPS (Intrusion Detection/Prevention System)?