1.7 Summarize the techniques used in security assessments Flashcards

1
Q

Threat hunting
-Intelligence fusion

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat hunting
-Threat feeds

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat hunting
-Advisories and bulletins

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat hunting
-Maneuver

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability scans
-False positives

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability scans
-False negatives

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability scans
-Log reviews

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerability scans
-Credentialed vs. non-credentialed

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability scans
-Intrusive vs. non-intrusive

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerability scans
-Application

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerability scans
-Web application

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerability scans
-Network

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerability scans
-Common vulnerabilities and Exposures (CVE)/Common Vulnerability Scoring System (CVSS)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerability scans
-Configuration review

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Syslog/Security information and event management (SIEM)
-Review reports

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Syslog/Security information and event management (SIEM)
-Packet capture

A
17
Q

Syslog/Security information and event management (SIEM)
-Data inputs

A
18
Q

Syslog/Security information and event management (SIEM)
-User behavior analysis

A
19
Q

Syslog/Security information and event management (SIEM)
-Sentiment analysis

A
20
Q

Syslog/Security information and event management (SIEM)
-Security monitoring

A
21
Q

Syslog/Security information and event management (SIEM)
-Log aggregation

A
22
Q

Syslog/Security information and event management (SIEM)
-Log collectors

A