4.3 Flashcards
True or False the vulnerability scanner looks for everything
False, looks particularly for signatures
List some results that will be part of the vulnerability scan results
Lack of security controls - No Firewall - No antivirus Misconfigurations Real vulnerabilites
What is SIEM and name some features
Security Information and Event Management
Log aggregation and long-term storage
Data correlation
Forensic analysis
These log files track information for switches, routers, access points, and VPN concentrators. What changes do these log files track
Network log files and they track network changes:
- Routing updates
- Authentication issues
- Network security issues
System log files gather information for what systems. What type of information do these log files gather
Operating system
- Extensive logs
- File system information
- Authentication details
True or False application log files are specific to the application. List the places you would find these files on MacOS, Linux, and Windows
True
Windows - Event viewer/Application Log
Linux & MacOS - /var/log
What is some log information associated with security log files
Blocked and allowed traffic flows
Exploit attempts
Blocked URL categories
DNS sinkhole
Web log files capture what type of information
Access errors
Exploit attempts
Server activity
These log files allow a user to view lookup requests, IP address of the request, Identify queries to known bad URLs, block or modify known bad requests
DNS log files
Define the purpose of Authentication log files
Identifies who logged in (or didn’t)
Identify multiple failures
Correlate with other events
- File transfers for example
True or False dump files store some of the content of memory into a diagnostic file
False dump files store all contents of memory into a diagnostic file
These logs allow you to look at -Inbound and outbound call info
- Security information
- SIP traffic logs
VoIP and Call Manager logs
This log management system is standard for messaging logs
Syslog
Name some properties on a Syslog
Usually a central logging receiver
Each log is entry is labeled
Syslog daemon options
What does Journalctl allow a user to do
provides a method for querying the system journal