In this module

IR0.6 Check My Knowledge

5 minutes · Module 0 · Free
Operational Objective
IR0 established four things: the cross-plane incident shape, the five-step reasoning chain, the CSF 2.0 framework vocabulary, and the toolkit map. These eight scenario questions test whether those four things are internalised well enough to apply without referring back to the module. Answering seven or eight correctly means you are ready for IR1. Answering fewer than six means at least one of the four foundations is not yet in place — the questions and their feedback will tell you which, and the relevant subsection is the one to re-read before continuing.
Deliverable: Confirmation that IR0 is internalised. Readiness to move to IR1.
Estimated completion: 15 minutes

Check My Knowledge

1. Why does this course insist on investigating the cloud and the endpoint together rather than treating them as separate specialisms?

Because the same forensic tools are used for both, which reduces the training overhead
Because Microsoft recommends a unified approach in its official IR documentation
Because modern Microsoft-stack attacks cross the cloud-endpoint boundary in minutes, and an investigation limited to one side produces a containment plan the attacker routes around via the unexamined side
Because it is faster to query a single portal than to switch between two

2. You find a PowerShell process creation record showing powershell.exe executed at 15:09 with an encoded command line, launched by outlook.exe, under the user account of the affected employee. Which statement correctly applies the three-statement evidence discipline?

This proves the attacker executed PowerShell at 15:09 after obtaining the user's credentials
This proves nothing conclusive, because process creation records can be tampered with
This proves PowerShell was executed at 15:09 under the user's context with evasion flags and an Outlook parent process; it does not prove whether the user or the attacker initiated the execution, or whether the encoded payload was malicious; the next step is to decode the payload, correlate with the user's email events around 15:09, and check network events from the process
This proves the user's credentials were compromised and PowerShell was used maliciously

3. According to current NIST guidance (SP 800-61 Revision 3), how does incident response relate to the phases you may remember from the 2012 Revision 2 lifecycle?

Revision 3 replaces the linear four-phase lifecycle with concurrent operations across six Functions of CSF 2.0 — Govern, Identify, Protect, Detect, Respond, Recover — where Detect, Respond, and Recover run in parallel during an active incident
Revision 3 added Govern and Recover as two new phases at the start and end of the Revision 2 lifecycle, preserving the four original phases in between
Revision 3 is an optional update; Revision 2's four-phase lifecycle is still NIST's primary incident response reference
Revision 3 is a US-federal-only document and does not apply to UK or EU organizations

4. You are writing an IR report that will be read by both the CISO (internal, operational) and the Head of Audit (external-facing, CSF 2.0-aligned). What is the current best practice for structuring it?

Write the entire report in CSF 2.0 Subcategory-reference language, because that is what the audit audience needs
Write an operational narrative in plain language that captures what happened, followed by a short framework mapping block that references the relevant CSF 2.0 Functions and Subcategories
Write two separate documents — one operational for the CISO, one framework-aligned for the Head of Audit
Skip the framework mapping entirely, because the operational narrative is what actually matters for containment decisions

5. A finance-team employee clicks an AiTM phishing link at 14:31, and the initial alert in your queue is an Entra ID Protection anomalous-sign-in notification timestamped 14:42 (the token replay from the attacker's IP). It is now 15:20. Which of the four one-sided investigation failures is the most likely outcome if you investigate the alert cloud-side only?

The investigation will miss the supplier's bank details change, because that is an upstream process issue not visible in cloud logs
The investigation will contain the cloud side (session revocation, inbox rule removal, password reset) but miss the endpoint loader, the beacon in memory, and the harvested credential hashes — which the attacker will use to re-enter the environment via a different user weeks later
The investigation will be blocked at the initial validation step, because Entra ID Protection alerts cannot be triaged without endpoint context
The investigation will produce a forensically sound outcome, because the AiTM pattern is well-documented and cloud-side containment is the standard response

6. You are confirming a persistence mechanism and have two competing hypotheses. Hypothesis A: "The attacker created a scheduled task for persistence." Hypothesis B: "The attacker registered an OAuth application in Entra ID for persistence." You have time to test one first. Which tool-to-hypothesis mapping is correct?

Run Volatility 3 against a memory image, because memory forensics will reveal both persistence types
Run KAPE to collect triage artefacts from the endpoint, because KAPE captures everything relevant to both hypotheses
For Hypothesis A, query Task Scheduler event logs (Event ID 4698) or the registry key under HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache. For Hypothesis B, query Entra ID audit logs for "Add service principal" and "Consent to application" events. The tool follows the hypothesis, not the other way around.
Run Microsoft Graph PowerShell against the tenant, because both persistence mechanisms are visible through the Graph API

7. A mid-level SOC analyst finishes this course. They work at an 800-person organization, investigate two to three incidents per month, and find that most of their investigation findings — attacker techniques their current detection rules did not catch — sit unused after the report is filed. With six hours per week available for skill development, which adjacent discipline has the highest expected operational return?

Deeper memory forensics, because nation-state tradecraft is an emerging threat
Detection engineering, because the analyst's own investigations already produce the raw material (attacker techniques their rules did not catch) that detection engineering converts into production rules — and each rule reduces the rate of future incidents of that class
Threat hunting, because proactive capability is always the right next investment
Network forensics, because the IR course does not cover the network telemetry side of investigation

8. You are the first responder on scene for an endpoint that shows signs of compromise from several days ago. The attacker has established persistence, but current activity pattern is data staging, not destruction — a beacon resident in memory, TCP connections to external IPs, and several gigabytes staged in a user-profile folder. The endpoint is reachable and you have forensic tools on a USB. What do you collect first?

Run KAPE immediately, because it collects the widest range of forensic artefacts quickly
Isolate the endpoint first to stop the data staging, then collect forensic evidence from the isolated system
Capture memory first with WinPMem, then run KAPE for the disk triage collection. Memory is the most volatile evidence, the in-memory beacon disappears on reboot or isolation, and running KAPE first modifies disk and memory state. Once memory is captured and hashed, then proceed with disk collection
Run Volatility 3 against the live system, because it is the memory forensics tool
💬

How was this module?

Your feedback helps us improve the course. One click is enough — comments are optional.

Thank you — your feedback has been received.