1.7 Flashcards

1
Q

Collecting and analyzing multiple sources of intelligence data to gain a comprehensive understanding of potential security threats

A

Intelligence fusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Real-time data streams containing information about known and emerging security threats, collected from various sources

A

Threat feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Updates and guidance on how to address security threats, provided by security vendors, government agencies, or open-source intelligence

A

Advisories and bulletins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adapting the hunt for potential threats and vulnerabilities based on new information

A

Maneuver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a vulnerability scanner flags something as a vulnerability, but it is not actually a threat

A

False positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When a vulnerability is present, but the scanner fails to identify it

A

False negatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Analyzing logs generated by systems and applications to detect and respond to security incidents

A

Log reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Credentialed vs. non-credentialed scans

A

Scanning with administrative credentials or without them. A credentialed scan provides more in-depth information on potential vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intrusive vs. non-intrusive scans

A

Scanning that either simulates an attack or doesn’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scanning applications for vulnerabilities

A

Application scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Scanning web applications for vulnerabilities

A

Web application scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scanning networks for vulnerabilities

A

Network scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standards for identifying, prioritizing, and reporting vulnerabilities

A

Common Vulnerabilities and Exposures (CVE)/Common Vulnerability Scoring System (CVSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reviewing the configuration of systems and applications to identify potential vulnerabilities

A

Configuration review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Collecting and analyzing security-related data from multiple sources to detect and respond to security incidents.

A

Syslog/Security information and event management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Analyzing reports generated by security tools and systems to identify potential vulnerabilities and security incidents.

A

Review reports

17
Q

Capturing and analyzing network traffic to identify potential security incidents.

A

Packet capture

18
Q

Using data from multiple sources to identify potential vulnerabilities and security incidents.

A

Data inputs

19
Q

Analyzing user behavior to detect anomalies and potential security incidents.

A

User behavior analysis

20
Q

Analyzing online conversations and social media to identify potential security incidents.

A

Sentiment analysis

21
Q

Monitoring systems and networks for potential security incidents.

A

Security monitoring

22
Q

Collecting and aggregating logs from multiple sources to identify potential security incidents.

A

Log aggregation