Question 1
Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the members of the incident response team. As a demo project he asked members of the incident response team to perform the following actions:
✑ Remove the network cable wires.
✑ Isolate the system on a separate VLAN
✑ Use a firewall or access lists to prevent communication into or out of the system.
✑ Change DNS entries to direct traffic away from compromised system
Which of the following steps of the incident handling process includes the above actions?
I agree with the suggested answer B (Containment). The actions described are standard methods used to limit the scope and magnitude of an incident by preventing the spread of a threat or isolating a compromised system from the rest of the network.
Reason
The actions listed—physically disconnecting network cables, logically isolating via VLAN, implementing Firewall/ACL blocks, and rerouting DNS—are all classic strategies within the Containment phase of the SANS/GIAC Incident Handling methodology. The goal of this phase is to stop the bleeding and prevent the attacker from communicating with Command and Control (C2) servers or pivoting to other internal systems.
Why the other options are not as suitable
- Option A is incorrect because Identification involves detecting the incident, determining its scope, and confirming that an actual breach has occurred, rather than taking active steps to isolate systems.
- Option C is incorrect because Eradication focuses on removing the root cause of the incident, such as deleting malware, disabling breached user accounts, and patching vulnerabilities after the system has already been contained.
- Option D is incorrect because Recovery is the process of restoring systems to normal operation, verifying they are functional and secure, and returning them to the production environment.