15 D4 Flashcards
IDS Network Placement:
___ - Provides the best of both DMZ placement and Trusted side placement.
Combination
Incident Categories:
4 - Denial of Service(DoS) (Incident) - ___
Incident Categories:
4 - Denial of Service(DoS) (Incident) - Activity that impairs, impedes, or halts normal functionality of a system or network.
Incident Categories:
5 - Non-Compliance Activity (Event) - ___
Incident Categories:
5 - Non-Compliance Activity (Event) - Activity that makes DOD systems potentially vulnerable. Not used if actual compromise occurs.
IDS Components:
__/__ - designed to process and control detectors / engines. Normally provide a centralized collection of logs.
Monitors / Consoles
__ is an event management tool built specifically for network security analysts.
Sguil
Incident Categories:
3 - Unsuccessful Activity Attempted (Event) - ___
Incident Categories:
3 - Unsuccessful Activity Attempted (Event) - Attempt to gain unauthorized access to the system which is defeated by normal defensive mechanisms.
Incident Categories:
7 - Malicious Logic (Incident) - ___
Incident Categories:
7 - Malicious Logic (Incident) - Installation of malicious software.
__ is an open source host based IDS. Performs log analysis, file integrity checking, policy monitoring, rootkit detection, real time alerting, and active response.
OSSEC
Incident Categories:
8 - Investigating (Event) - ___
Incident Categories:
8 - Investigating (Event) - Events that are potentially malicious and warrants or is undergoing further review.
Metadata Rule Options:
__ - is used to uniquely identify Snort rules.
sid
Snort rule header fields: 1 \_\_ 2 \_\_ 3 \_\_ 4 \_\_ 5 \_\_ 6 \_\_ 7 \_\_
1 Action Field 2 Protocol Field 3 Source IP 4 Source port 5 Traffic Direction field 6 Destination IP 7 Destination port
__ is a command line tool that pulls files from network traffic; uses file signatures to recognize and then extract different file types.
Tcpxtract
Snort runs in 3 modes: __, __, __.
Sniffer mode, Packet Logger mode, and Intrusion Detection mode.
Firewall Types:
___ packet filtering examines packet header information. Does not check packet contents for dangerous data.
Stateless packet filtering
Defense in Depth:
__ Attacks - Includes attempts to circumvent or break protection features, introduce malicious code, or steal or modify information.
Active Attacks
Defense in Depth:
__ Attacks - Includes traffic analysis, monitoring of unprotected comms, decrypting weakly encrypted traffic, and capturing authentication information such as passwords.
Passive Attacks
__ is a network intrusion prevention and detection system. Combining the benefits of signature, protocol, and anomaly based inspection.
Snort
IDS Methods:
___ - Scans packets for any deviations from standard RFC’s.
Protocol Anomaly
___ is a flexible, open source network IDS/IPS that can detect a variety of attacks and probes, such as buffer overflows, port scans, CGI attacks, and OS fignerprinting attempts.
Snort
IDS Methods:
___ - Scans packets for specific byte sequences and compares them to a database of known attacks.
Pattern Matching
Snort:
__ mode captures network traffic similar to TCPDump.
Sniffer mode
Metadata Rule Options:
__ - is used to uniquely identify revisions of Snort rules.
rev
__ is a GUI network protocol analyzer; allows to interactively browse packet data from a live network or from a previously saved capture file.
Wireshark
Metadata Rule Options:
__ - using this, a user can specify priority for each type of rule classifications.
classtype
___ identify specific attacks or malicious traffic coming across a network or to a specific host.
Intrusion Detection Systems (IDSs)
__ is a web based event management tool that allows an analyst to query and view event data using metadata, time series representations, weighted, and logically grouped result sets.
Squert
Content Modifier Keywords:
__ - makes sure the N bytes are between pattern matches using the content.
within
Incident Categories:
1 - Root Level Intrusion (Incident) - ___
Incident Categories:
1 - Root Level Intrusion (Incident) - Unauthorized privileged access to a DOD system.