1.7 Techniques used in security assessments Flashcards

1
Q

Intelligence fusion

A

This combines information from threat feeds, security advisories and bulletins and other sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat feeds

A

These are intended to provide up to date detail about threats in a way that your organization can leverage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advisorie and bulletins

A

This is part of threat hunting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

maneuver

A

this is part of threat hunting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

False positives

A

When a scanner reports a vulnerability that doesnt exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

false negatives

A

When a vulnerability scanner reports an inaccurate report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

log reviews

A

These are from servers, applications etc, that might contain information about possible attempts to exploit detected vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

credentialed vs. non credentialed

A

Credentialed scan can check whether the update is installed on the system before reporting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

application

A

These are commonly used as part of the software development process to identify common security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

web application

A

Specialized tools used to examine the security of web applications. They test for SQL injections, XSS etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

network

A

Vulnerability scan that runs over a network, probing the system from a distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

common vulnerabilities and exposures (CVE)

A

Provides a standard nomenclature for describing security-related software flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

common vulnerability scoring system (CVSS)

A

Provides a standardized approach for measuring and describing the severity of security related software flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Syslog/Security information and event management (SIEM)

A

Systems that correlate log entries from multiple sources and provide actionable intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packet Capture

A

The ability to capture and analyze raw packet data from network traffic can be useful for incident analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data inputs

A
17
Q

sentiment analysis

A

A process by which they look at text using natural language processing and other text analysis tools to determine emotions from textual data

18
Q

security monitoring

A

This is a tool that organizations use called SIEM

19
Q

log aggregation

A

Taking data from a variety of sources and then performing correlation and analysis activities with that data.

20
Q

log collectors

A

This is an open source and commercially supported syslog tool that can parse and generate log files in many common formats.

21
Q

Security orchestration, automation, and response (SOAR)

A

These help with the mitigation and recovery processes that often reconfigure endpoint security solutions to ensure organizations are secure.