1.7 Summarize the techniques used in security assessments Flashcards

1
Q

The activity of security professionals to seek out and identity new threats. It is a proactive search through IoCs, log files, or other observables to locate malware or intruders lurking on a system. It often involves intelligence fusion, use of threat feeds, reviewing advisories and bulletins, and implementing relevant maneuvers.

A

Threat Hunting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used to discover weaknesses in deployed security systems to improve or repair them before a breach occurs.

A

Vulnerability Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A tool used to scan a target system for known holes, weaknesses, or vulnerabilities.

A

Vulnerability Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Occurs when an alarm or alert is triggered by benign or normal events. It is an alarm without a malicious event.

A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

occurs when an alarm or alert is not triggered by malicious or abnormal events. A false negative is a malicious event without an alarm.

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A scan where the logon credentials of a user are provided to the scanner for it to perform its work. Usually less aggressive.

A

Credentialed scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A scan where no user accounts are provided to the scanning tool, so only those vulnerabilities that don’t require credentials are discovered. Usually more aggressive.

A

Non credentialed scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A scan that attempts to exploit any flaws or vulnerabilities detected.

A

Intrusive vulnerability scan (active evaluation or aggressive scanning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Only discovers the symptoms of flaws and vulnerabilities and doesn’t attempt to exploit them.

A

Non-intrusive vulnerability scan (a.k.a. passive evaluation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An effort led by the NIST in an effort to establish a standardized means to define and communicate security related events and issue information

A

Security Content Automation Protocol (SCAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assigns identifiers to publicly known system vulnerabilities to be used for cross-link and cross-referencing purposes.

A

Common Vulnerabilities and Exposures (CVE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An open framework for communicating the characteristics and severity of software vulnerabilities.

A

Common Vulnerability Scoring System (CVSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When vulnerability scanners can determine whether you have improper, poor, or misconfigured systems and protections.

A

Configuration review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Enables the real-time cloning of logs from their primary origin point to a secondary system, typically the syslog server itself.

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A centralized application to automate the monitoring of network systems. It can use triggers or thresholds that oversee specific features, elements, or events that will send alerts or initiate alarms when specific values or levels are breached.

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A collection of software solutions that can automate the process of collecting and analyzing log and real-time data, evaluate it in light of materials from threat intelligence sources, and then trigger response to low and mid-level severity issues without the need for human involvement.

A

Security orchestration, automation, and response (SOAR)