Unit5 - Subjective Questions

INT242 • Practice Questions with Detailed Answers

1

Describe the phases of the Incident Response Lifecycle as defined by the NIST framework.

2

What is Digital Forensics? Explain the standard process model used in forensic investigations.

3

Explain the concept of Chain of Custody and why it is critical in digital forensics.

4

Differentiate between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).

5

List and explain three major Data Sources used for security monitoring and incident response.

6

What is a SIEM (Security Information and Event Management) system, and what are its core functions?

7

Discuss common Indicators of Compromise (IoC) associated with a Malware attack.

8

Explain the concept of Network Beaconing as an indicator of malicious activity.

9

What are the key indicators of a DDoS (Distributed Denial of Service) attack?

10

Describe Physical Attack Indicators in the context of cyber security.

11

Identify and explain common indicators of Application Layer Attacks (specifically SQL Injection and XSS).

12

Explain the role of a CSIRT (Computer Security Incident Response Team).

13

What is the Order of Volatility in digital forensics? Why is it important?

14

Compare SOAR (Security Orchestration, Automation, and Response) with traditional SIEM.

15

What are False Positives and False Negatives in the context of security monitoring? Which is more dangerous?

16

Describe the NetFlow data source and its utility in incident analysis.

17

Explain the difference between Isolation and Segmentation as containment strategies.

18

What are the indicators of a Social Engineering or Phishing attack?

19

Derive the importance of Logs in the context of the equation:

.

20

Discuss the Post-Incident Activity phase. Why is it often neglected?