4.3 Flashcards

1
Q

True or False the vulnerability scanner looks for everything

A

False, looks particularly for signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List some results that will be part of the vulnerability scan results

A
Lack of security controls
- No Firewall 
- No antivirus
Misconfigurations
Real vulnerabilites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SIEM and name some features

A

Security Information and Event Management
Log aggregation and long-term storage
Data correlation
Forensic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These log files track information for switches, routers, access points, and VPN concentrators. What changes do these log files track

A

Network log files and they track network changes:

  • Routing updates
  • Authentication issues
  • Network security issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

System log files gather information for what systems. What type of information do these log files gather

A

Operating system

  • Extensive logs
  • File system information
  • Authentication details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False application log files are specific to the application. List the places you would find these files on MacOS, Linux, and Windows

A

True
Windows - Event viewer/Application Log
Linux & MacOS - /var/log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is some log information associated with security log files

A

Blocked and allowed traffic flows
Exploit attempts
Blocked URL categories
DNS sinkhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web log files capture what type of information

A

Access errors
Exploit attempts
Server activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These log files allow a user to view lookup requests, IP address of the request, Identify queries to known bad URLs, block or modify known bad requests

A

DNS log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define the purpose of Authentication log files

A

Identifies who logged in (or didn’t)
Identify multiple failures
Correlate with other events
- File transfers for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False dump files store some of the content of memory into a diagnostic file

A

False dump files store all contents of memory into a diagnostic file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These logs allow you to look at -Inbound and outbound call info

  • Security information
  • SIP traffic logs
A

VoIP and Call Manager logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This log management system is standard for messaging logs

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some properties on a Syslog

A

Usually a central logging receiver
Each log is entry is labeled
Syslog daemon options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Journalctl allow a user to do

A

provides a method for querying the system journal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do Bandwidth monitors do

A

They identify percentage of network use over time and they also identify fundamental issues

17
Q

What is metadata. Name some examples

A

Data that describes other data sources
Examples:
- Email header details
- Type of mobile phone and GPS location for a phone

18
Q

What gathers traffic statistics from all traffic flows. Also has a probe that watches and network communication

A

Netflow

19
Q

What is IPFIX

A

IP Flow Information Export. Evolved from NetFlow

20
Q

True or False sFlow (Sample Flow) is responsible for all of the actual network traffic

A

False, it’s partcially responsible and it is usually embedded in switches and routers

21
Q

What does Protocol analyzer output look for

A

Looks to solve complex application issues. gather packets on the internet, and view detailed traffic information