Response Phase Question Bank
Universal Response Questions
Strategic Response Planning
These work for any Malmon after investigation is complete:
- “Given everything you’ve learned, what’s your response strategy?”
- “What are your priorities for stopping this threat?”
- “How do you balance speed with thoroughness in your response?”
- “What constraints affect your response options?”
- “What could go wrong with your proposed approach?”
- “How do you coordinate your individual actions into a team response?”
Risk Assessment Questions
- “What’s the risk of taking action versus waiting for more information?”
- “How do you minimize collateral damage during response?”
- “What business operations must continue during your response?”
- “What happens if your response fails or is incomplete?”
- “How do you balance containment with evidence preservation?”
Role-Specific Response Questions
Detective Response Questions
Evidence Preservation
- “What evidence needs to be preserved before taking response actions?”
- “How do you maintain chain of custody during active response?”
- “What documentation is critical for post-incident analysis?”
- “How do you balance evidence collection with urgent containment?”
- “What forensic data might be lost during response actions?”
Continued Investigation During Response
- “What ongoing monitoring do you need during response actions?”
- “How do you detect if the threat adapts to your countermeasures?”
- “What indicators would show successful versus failed response actions?”
- “How do you investigate while simultaneously responding?”
- “What new evidence might emerge during the response phase?”
Validation and Verification
- “How do you verify that your response actions are working?”
- “What would confirm complete threat elimination?”
- “How do you distinguish between successful containment and threat evolution?”
- “What follow-up investigation is needed after initial response?”
- “How do you validate system integrity after remediation?”
Protector Response Questions
Immediate Containment
- “What systems need immediate isolation to prevent further spread?”
- “How do you contain the threat without disrupting critical operations?”
- “What defensive measures can be deployed rapidly?”
- “How do you prevent the threat from detecting your response actions?”
- “What emergency controls can be implemented immediately?”
System Hardening and Recovery
- “What systems need to be rebuilt versus cleaned?”
- “How do you harden systems against reinfection during recovery?”
- “What security controls should be enhanced during rebuilding?”
- “How do you prioritize system restoration for business continuity?”
- “What patches or updates are critical for prevention?”
Defensive Strategy Implementation
- “How do you implement layered defenses against this threat type?”
- “What monitoring capabilities need to be enhanced?”
- “How do you protect against similar future attacks?”
- “What security architecture changes would prevent this attack?”
- “How do you balance security improvements with operational needs?”
Tracker Response Questions
Network Containment
- “How do you cut off the threat’s network access without disrupting business?”
- “What network segmentation can prevent lateral movement?”
- “How do you block command and control communications?”
- “What traffic needs to be monitored during containment efforts?”
- “How do you prevent data exfiltration during response actions?”
Data Protection and Recovery
- “What data needs immediate protection from further compromise?”
- “How do you secure backup systems during the response?”
- “What data restoration is required for business continuity?”
- “How do you verify data integrity after threat removal?”
- “What data loss occurred and can it be recovered?”
Infrastructure Disruption
- “How do you disrupt the attacker’s infrastructure without legal issues?”
- “What coordination with external providers is needed?”
- “How do you prevent the threat from establishing new infrastructure?”
- “What threat intelligence sharing would help the broader community?”
- “How do you track whether the threat has alternative access methods?”
Communicator Response Questions
Stakeholder Management
- “Who needs to be informed about response actions and when?”
- “How do you balance transparency with operational security during response?”
- “What communication protocols are needed during active response?”
- “How do you manage stakeholder expectations during extended response?”
- “What regular updates are needed for different stakeholder groups?”
External Communication
- “What regulatory notifications are required and when?”
- “How do you coordinate with law enforcement during response?”
- “What customer communication is needed about service impacts?”
- “How do you manage media inquiries during active response?”
- “What information can be shared with industry partners?”
Crisis Communication
- “How do you maintain team morale during extended response efforts?”
- “What communication is needed with affected users?”
- “How do you coordinate with external incident response teams?”
- “What legal consultation is needed for response decisions?”
- “How do you prepare public statements if the incident becomes public?”
Crisis Manager Response Questions
Overall Response Coordination
- “How do you orchestrate the team’s response efforts?”
- “What decision-making authority is needed for response actions?”
- “How do you allocate resources across competing response priorities?”
- “What escalation criteria trigger additional response resources?”
- “How do you maintain situational awareness during complex response operations?”
Business Continuity Management
- “What critical business functions must be maintained during response?”
- “How do you balance security response with operational requirements?”
- “What alternative processes can substitute for compromised systems?”
- “How do you manage the financial impact of extended response efforts?”
- “What supply chain or partner impacts need management?”
Strategic Decision Making
- “What response decisions require board or executive approval?”
- “How do you assess the cost-benefit of different response options?”
- “What long-term strategic changes should result from this incident?”
- “How do you balance immediate response with future prevention?”
- “What lessons learned should be captured during response?”
Threat Hunter Response Questions
Proactive Threat Elimination
- “What additional threats should you hunt for during response?”
- “How do you ensure complete threat removal, not just containment?”
- “What persistence mechanisms might survive standard response actions?”
- “How do you hunt for related threats that might be dormant?”
- “What would indicate the threat has established backup access methods?”
Advanced Response Techniques
- “What deception techniques could be used against this threat?”
- “How do you respond without alerting other potential threats?”
- “What threat intelligence should be gathered during response?”
- “How do you coordinate with external threat hunting teams?”
- “What attribution evidence should be collected during response?”
Future Prevention Strategy
- “What threat hunting capabilities should be enhanced after this incident?”
- “How do you develop proactive defenses against similar threats?”
- “What threat intelligence feeds would have prevented this incident?”
- “How do you improve organizational threat hunting maturity?”
- “What partnerships would enhance future threat detection?”
Type-Effectiveness Questions
Exploiting Malmon Weaknesses
For Trojan-Type Malmons (Weak to Detection)
- “How do you implement behavioral analysis to catch masquerading threats?”
- “What detection rules would identify this type of deception?”
- “How do you validate software authenticity in your environment?”
- “What user training prevents future social engineering success?”
- “How do you implement application whitelisting to prevent unauthorized software?”
For Worm-Type Malmons (Weak to Isolation)
- “How do you rapidly implement network segmentation?”
- “What network access controls can stop propagation immediately?”
- “How do you isolate affected segments without business disruption?”
- “What patching strategy addresses the propagation vector?”
- “How do you prevent reinfection when bringing systems back online?”
For Ransomware-Type Malmons (Weak to Backup)
- “How quickly can you restore from clean backups?”
- “What backup verification is needed before restoration?”
- “How do you prioritize system restoration for business continuity?”
- “What additional backup strategies should be implemented?”
- “How do you ensure backups are protected from future ransomware?”
For APT-Type Malmons (Weak to Intelligence)
- “What threat intelligence helps understand this adversary’s methods?”
- “How do you leverage external intelligence for response planning?”
- “What indicators of compromise should be shared with the community?”
- “How do you coordinate with national cybersecurity agencies?”
- “What attribution information supports law enforcement action?”
Coordination and Team Response Questions
Team Synchronization
- “How do your individual response actions support the overall strategy?”
- “What information sharing is critical during response execution?”
- “How do you avoid conflicting or counterproductive actions?”
- “What coordination checkpoints are needed during extended response?”
- “How do you maintain team cohesion under pressure?”
Resource Management During Response
- “What additional expertise or resources are needed for effective response?”
- “How do you manage team fatigue during extended response operations?”
- “What external resources (contractors, law enforcement, vendors) should be engaged?”
- “How do you prioritize resource allocation across competing response needs?”
- “What budget authority is needed for response activities?”
Real-Time Adaptation
- “How do you adapt your response if the threat evolves during your actions?”
- “What would cause you to change your response strategy mid-execution?”
- “How do you respond if your initial actions prove ineffective?”
- “What backup response plans are needed if primary approaches fail?”
- “How do you balance persistence with flexibility in response execution?”
Decision-Making Under Pressure
Critical Decision Points
- “What decisions cannot be delayed without significant risk?”
- “How do you make decisions with incomplete information?”
- “What would you do if you had unlimited resources versus realistic constraints?”
- “How do you balance perfect security with business reality?”
- “What decisions would you make differently if this were your own company?”
Risk Tolerance Assessment
- “What level of business disruption is acceptable to ensure complete threat removal?”
- “How do you balance the risk of incomplete response with operational needs?”
- “What would convince you to take more aggressive response actions?”
- “How do you assess whether response actions are sufficient versus excessive?”
- “What criteria determine when response efforts can be scaled back?”
Malmon-Specific Response Scenarios
Evolution Prevention Questions
- “What would prevent [Malmon Name] from evolving to its next stage?”
- “How do you disrupt the evolution triggers for this threat type?”
- “What response timing is critical to prevent threat escalation?”
- “How do you monitor for signs of attempted evolution during response?”
- “What happens to your response strategy if evolution occurs during your actions?”
Advanced Threat Response
For Nation-State Threats (Stuxnet, Noodle RAT)
- “How would you adapt your response approach for highly resourced adversaries?”
- “What operational security practices have you used for sensitive incidents?”
- “How would you coordinate with external agencies based on your experience?”
- “What broader considerations would influence your response strategy?”
- “How do you prepare for long-term, sophisticated threats?”
For Criminal Enterprise Threats (LockBit, Gh0st RAT)
- “How would you balance law enforcement coordination with business needs?”
- “What reporting obligations have you dealt with in financial incidents?”
- “How do you manage security risks from adversarial retaliation?”
- “What evidence preservation practices have you used before?”
- “How do you handle disclosure decisions during ongoing investigations?”
Time-Pressure Response Questions
Immediate Action Requirements
- “What must be done in the next 10 minutes to prevent catastrophic damage?”
- “What can wait versus what requires immediate action?”
- “How do you triage response priorities under extreme time pressure?”
- “What response actions can be parallelized versus what must be sequential?”
- “What would you do if you had only one response action available?”
Extended Response Planning
- “What response activities need to continue over days or weeks?”
- “How do you maintain response effectiveness during extended operations?”
- “What shift coverage is needed for round-the-clock response?”
- “How do you prevent responder burnout during marathon incidents?”
- “What checkpoints help assess progress during long-term response?”
Response Success and Failure Questions
Success Metrics
- “How do you measure whether your response was successful?”
- “What indicators confirm complete threat elimination?”
- “How do you validate that normal operations can safely resume?”
- “What follow-up monitoring is needed to ensure response effectiveness?”
- “How do you distinguish between threat elimination and temporary suppression?”
Failure Recovery
- “What would you do if your primary response strategy fails?”
- “How do you recover from response actions that make the situation worse?”
- “What escalation options exist if current response proves insufficient?”
- “How do you pivot to alternative response strategies under pressure?”
- “What would force you to declare your response unsuccessful and try a different approach?”
Post-Response Transition Questions
Recovery and Restoration
- “How do you transition from active response to recovery operations?”
- “What system restoration priorities support business continuity?”
- “How do you verify that recovery actions don’t reintroduce vulnerabilities?”
- “What enhanced monitoring is needed during the recovery phase?”
- “How do you communicate the transition from crisis response to normal operations?”
Lessons Learned Integration
- “What changes to your response procedures are needed based on this experience?”
- “How do you capture and institutionalize lessons learned during response?”
- “What training or capability gaps were revealed during response?”
- “How do you share response insights with the broader security community?”
- “What would you do differently if facing this same threat again?”
Emergency Response Questions
When Response Stalls
- “What’s preventing progress in your response efforts?”
- “How do you break through analysis paralysis during response?”
- “What would happen if you took action despite incomplete information?”
- “What single action would have the biggest impact right now?”
- “How do you overcome organizational resistance to necessary response actions?”
When Everything Goes Wrong
- “What would you do if all your response actions backfire?”
- “How do you maintain team cohesion when response fails?”
- “What help would you call for in a worst-case scenario?”
- “How do you protect what’s most critical when you can’t protect everything?”
- “What would you tell leadership if your response appears to be failing?”
Response Phase Success Indicators
Effective Response Characteristics
Learning and Development Indicators
Remember: Response phase questions should drive action while maintaining coordination. The goal is effective threat neutralization through collaborative, well-coordinated team response that balances urgency with thoroughness.