3.0 Detect Flashcards

1
Q

Analyze security system logs, security tools, and data

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP networking/Ip resolving

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dos attacks/DDos attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security vulnerability databases

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intrusion detection systems

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSL decryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SIEM

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DLP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evaluate and interpret metada

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network topology

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Anomalies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

False positives

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Superhuman logins/geo-velocity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

APT activity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Botnets

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Unauthorized programs in the startup menu

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Presence of attack tools

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Registry entries

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Unusual network traffic

A

Bandwidth usage
Malicious network communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Off hour usage

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

New administrator/user accounts

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Guest account usage

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Unknown open ports

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Unknown use of protocols

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Service disruption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Website defacement

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Unauthorized changes/modifications

A

Suspicious files
Patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Recipient of suspicious emails

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Unauthorized sessions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Failed logins

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Rogue hardware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Agent-based log collection

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Agentless log collection

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Syslog log collection

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Source validation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Verification of log integrity

42
Q

Evidence collection

43
Q

Ip address and hostname resolution

44
Q

Field name consistency

45
Q

Time zones

46
Q

Threat hunting

47
Q

Long tail analysis

48
Q

Intrusion detection

49
Q

Behavioral monitoring

50
Q

Log retention

51
Q

Log aggregator and analytics tools

52
Q

Linux tools

A

grep
cut
diff

56
Q

Windows tools

A

find
WMIC
Event viewer

59
Q

Event Viewer

61
Q

Powershell

62
Q

Network-based

63
Q

WAP logs

64
Q

WIPS logs

65
Q

Controller logs

66
Q

Packet capture

67
Q

Traffic log

68
Q

Flow data

69
Q

Device state data

71
Q

Host-based

72
Q

Linux syslog

73
Q

Application logs

74
Q

Cloud Audit logs

75
Q

Threat feeds

76
Q

Asset discovery methods and tools

77
Q

Alerting systems

78
Q

Intrusion prevention or detections systems (IDS/IPS)

79
Q

Firewalls

80
Q

Endpoint detection and response (EDR)

81
Q

Common indicators of potential compromise, anomalies, and patterns

82
Q

Analysis tools

83
Q

Document and communicate results

84
Q

Communication and documentation policies and processes

85
Q

Security incident reports

A

Description
Potential impact
Sensitivity of information
Logs

86
Q

Escalation processes and procedures

A

Specific technical processes
Techniques
Checklists
Forms

87
Q

Incident response teams

88
Q

Levels of authority

89
Q

Personnel roles and responsibilities

90
Q

Document and communicate results

91
Q

Command and control

92
Q

Data exfiltration

93
Q

Pivoting

94
Q

Lateral movement

95
Q

Persistence/maintaining access

96
Q

Keylogging

97
Q

Anti-forensics

98
Q

Covering tracks

99
Q

Prioritization or severity ratings of incidents

100
Q

Communication policies and procedures

101
Q

Levels of authority

102
Q

Communicate recommended courses of action and countermeasures