{"id":114607,"date":"2023-08-22T09:42:15","date_gmt":"2023-08-22T09:42:15","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=114607"},"modified":"2023-08-22T09:42:17","modified_gmt":"2023-08-22T09:42:17","slug":"wgu-c842-cyber-defense-and-counter-measures-tools-wgu-c842-cyber-defense-and-counter-measures-tools","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/22\/wgu-c842-cyber-defense-and-counter-measures-tools-wgu-c842-cyber-defense-and-counter-measures-tools\/","title":{"rendered":"WGU C842 Cyber Defense and Counter Measures Tools WGU C842 Cyber Defense and Counter Measures Tools"},"content":{"rendered":"\n<p>1 \/<br>WGU C842 Cyber Defense and Counter Measures Tool1.incident handling response steps: 1. Preparation<br>2.Incident Recording<br>3.Incident Triage<br>4.Notification<br>5.Containment<br>6.Evidence Gathering and Forensic Analysis<br>7.Eradication<br>8.Recovery<br>9.Post-Incident ActivitiesIncident DocumentationIncident Impact<br>Assessment- Review and<br>Revise Policies- Close the<br>Investigation- Incident<br>Disclosure<br>2.Risk Assessment Management tools: PILAR &#8211; It helps incident handlers<br>to assess risks against critical assets of the organization in several<br>dimensions such as confidentiality, integrity, availability, authenticity,<br>and accountability<\/p>\n\n\n\n<p>2 \/<br>A1 Tracker<br>Risk Management Studio<br>3.Tools for Incident Analysis and Validation: buck-security &#8211; allows<br>incident handlers to identify the security status of a system. It gives<br>an overview of the security status of the system within a couple of<br>minutes<br>kiwi syslog server &#8211; It allows you to centrally manage syslog messages,<br>generates real-time alerts based on syslog messages, and perform<br>advanced message filtering and message buffering<br>splunk light &#8211; It is a tool for collecting, monitoring, and analyzing log filefrom servers, applications, or other sources<br>\u00aa Loggly (https:\/\/www.loggly.com) \u00aa InsightOps<br>(https:\/\/www.rapid7.com) \u00aa Logz.io (https:\/\/www.logz.io) \u00aa<br>Logmatic.io (https:\/\/www.logmatic.io) \u00aa Graylog<br>(https:\/\/www.graylog.org<br>4.Tools for Detecting Missing Security Patches: Microsoft Baseline<br>Security Analyzer &#8211; MBSA lets incident handlers scan local and remote<br>systems for missing security updates as well as common security<br>misconfigurations<\/p>\n\n\n\n<p>3 \/<br>\u00aa GFI LanGuard (https:\/\/www.gfi.com)<br>\u00aa Symantec Client Management Suite<br>(https:\/\/www.symantec.com) \u00aa MaaS360 Patch Analyzer<br>(https:\/\/www.ibm.com)<br>\u00aa Solarwinds Patch Manager (https:\/\/www.solarwinds.com)<br>\u00aa Kaseya Security Patch Management<br>(https:\/\/www.kaseya.com) \u00aa Software Vulnerability<br>Manager (https:\/\/www.flexera.com)<br>\u00aa Ivanti Endpoint Security (https:\/\/www.ivanti.com)<br>\u00aa Patch Connect Plus (https:\/\/www.manageengine.com) \u00aa Automox<br>(https:\/\/www.au- tomox.com)<br>\u00aa Prism Suite (https:\/\/www.newboundary.co<br>5.report writing tools: MagicTree &#8211; stores data in a tree structure<br>This is a natural way of representing the information that is gathered<br>during a network test: a host has ports, which have services,<br>applications, vulnerabilities, etc.<br>KeepNote &#8211; is used to store class notes, TODO lists, research notes,<br>journal entries, paper outlines, etc. in a simple notebook hierarchy with<br>rich-text formatting, images, and more<br>6.data imaging tools: FTK imager &#8211; It is a data preview and imaging tool<br>that enables analysis of files and folders on local hard drives,<br>CDs\/DVDs, and network drives<br>R-Drive image &#8211; buck-security allows incident handlers to identifying<\/p>\n\n\n\n<p>4 \/<br>the security status of a system. It gives an overview of the security<br>status of the system within a couple of minutes<br>\u00aa EnCase Forensic (https:\/\/www.guidancesoftware.com) \u00aa Data<br>Acquisition Tool- box (https:\/\/in.mathworks.com) \u00aa RAID Recovery for<br>Windows (https:\/\/www.run- time.org) \u00aa R-Tools R-Studio<br>(https:\/\/www.r-studio.com) \u00aa F-Response Imager (https:\/\/www.fresponse.com<br>7.tools for calculating hash value:<br>HashCalc MD5 Calculator<br>HashMyFiles<br>8.Collecting Volatile Information: System Information: Tools and<br>commands to collect the information: Systeminfo.exe (Windows)<br>PsInfo<br>(Windows) Cat<br>(Linux) Uname<br>(Linux)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 \/WGU C842 Cyber Defense and Counter Measures Tool1.incident handling response steps: 1. Preparation2.Incident Recording3.Incident Triage4.Notification5.Containment6.Evidence Gathering and Forensic Analysis7.Eradication8.Recovery9.Post-Incident ActivitiesIncident DocumentationIncident ImpactAssessment- Review andRevise Policies- Close theInvestigation- IncidentDisclosure2.Risk Assessment Management tools: PILAR &#8211; It helps incident handlersto assess risks against critical assets of the organization in severaldimensions such as confidentiality, integrity, availability, authenticity,and accountability [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-114607","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/114607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=114607"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/114607\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=114607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=114607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=114607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}