4.4 Flashcards

1
Q

DLP

A

data loss prevention
a strategy to prevent sensitive data from leaving an org
aims to monitor data in use, in transit or at rest to detect and precent data theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of DLP Systems

A

Endpoint DLP
Network DLP
Storage DLP
Cloud Based DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Endpoint DLP

A

installed as a software on workstations or laptops
monitors data in use on individual computers
can prevent or alert on file transfers based on predefined rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NEtwork DLP

A

Software or hardware placed at the network perimeter
● Focuses on monitoring data entering and leaving the network
● Detects unauthorized data leaving the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Storage DLP

A

installed on a server in the data center
inspects data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud based DLP

A

offered as a SaaS solution
protects data in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Monitoring systems

A

involves observing CPU< memory, disk usage, and netowrk performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Baseline

A

A reference point representing normal system behavior under typical operating
conditions
■ Baseline metrics can include CPU usage, memory utilization, disk activity, and
network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Alerting

A

Involves setting up notifications for specific events or conditions
● Alerts can be triggered based on thresholds or anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scanning

A

Regularly examines systems, networks, or applications to identify
vulnerabilities, misconfigurations, and issues
includes code scanning, configurations canning and code scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

archiving

A

Involves long-term storage of data, including
○ Log data
○ Performance data
○ Incident data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Quarantining

A

Isolates a system, network, or application suspected of being compromised
■ Prevents the spread of threats and limits potential impact
■ Commonly used when dealing with malware infections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Alert Tuning

A

Adjusts alert parameters to reduce errors, false positives, and improve alert
relevance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SNMP

A

Simple Network Management Protocol (SNMP)
An Internet protocol used for collecting information from managed devices on IP
networks and modifying device behavior
Managed devices include the following
● Routers
● Switches
● Firewalls
● Printers
● Servers
● Client devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SNMP MAnager

A

A central system that collects and processes information from managed devices
■ Often set up as a server, especially in large enterprise environments
■ Sends and receives SNMP messages to and from agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SNMP Agents

A

Networked devices that send information about themselves to the manager
■ Run background services to collect data and send it to the manager
■ Transmit data at regular intervals or when requested by the manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SNMP Message Types

A

SET
GET
TRAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SET

A

Manager-to-agent request to change variable valuesG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

GET

A

Manager-to-agent request to retrieve variable values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TRAP

A

Asynchronous notifications from agents to the manager to notify
significant events
● Notify the manager of events such as uptime, configuration changes, and
network downtime
● May be granular or verbose

21
Q

TRAP Granular

A

Sent TRAP messages get a unique object identifier OID) to
distinguish each message as a unique message being
received

22
Q

OID

A

Unique object identifier used to identify variables
for reading or setting via SNMP
● Allows the manager to distinguish individual SNMP
trap messages

23
Q

MIB

A

management info base
A hierarchical namespace containing OIDs and their
descriptions
● Describes the structure of device subsystem
management data
● Stores consolidated information received through
SNMP traps

24
Q

Verbose TRAP

A

SNMP traps may be configured to contain all of the information about a given alert or event as a payload

25
Q

SNMP V3

A

SNMP version 3 offers enhanced security features
integrity
ntegrity
■ Hashing messages before transmission to prevent data
alteration
○ Authentication
■ Validating the source of messages
○ Confidentiality
■ Adding encryption using DES, 3DES, or AES
○ Dividing SNMP components into entities with different access
privileges for improved security

26
Q

SIEM

A

SIEM (Security Information and Event Management)
■ A solution for real-time or near-real-time analysis of security alerts generated by
network hardware and applications
■ SIEM helps correlate various events and incidents from system log
SIEM Functionality
■ Correlates and analyzes log data
■ Consolidates data from various systems into a centralized database or repository
■ Detects patterns indicating security threats
■ Generates alerts for security teams to investigate

27
Q

Agent based SIEM

A

Software agents are installed on each system to collect and send log data
● Provides real-time data and detailed information

28
Q

Agentless SIEM

A

Log data is collected directly from systems using standard protocols
● Reduces maintenance but may not collect real-time or detailed data

29
Q

ELK

A

(Elastic Stack)
● A collection of free and open-source SIEM tools, including the following
○ Elasticsearch
○ Logstash
○ Kibana
○ Beats
Components work together for log collection, storage, analysis, and virtualization

30
Q

Archsight

A

SIEM log management and analytics software
● Suitable for compliance reporting for regulations like HIPAA, SOX, and PCI
DSS

31
Q

QRadar

A

A SIEM log management, analytics, and compliance reporting platform
created by IBM

32
Q

Firewalls

A

Act as a barrier between trusted internal networks and untrusted external
networks
■ Filter incoming and outgoing traffic based on security rules (ACLs)

33
Q

Vulnerability Scanners

A

Identify security weaknesses, including missing patches, incorrect configurations,
and known vulnerabilitie

34
Q

SCAP

A

Security Content Automation Protocol (SCAP)
Suite of open standards that enhances the automation of vulnerability
management, measurement, and policy compliance evaluation of systems
deployed in an organization
■ Developed by the National Institute of Standards and Technology (NIST)
■ Enhances the automation of security tasks, including the following
● Vulnerability scanning
● Configuration checking
● Software inventory

35
Q

OVAL

A

an SCAP language
(Open Vulnerability and Assessment Language)

36
Q

XCCD

A

SCAP language
(Extensible Configuration Checklist Description Forma
XML schema for developing and auditing best-practice configuration
checklists and rules
● Allows improved automation

37
Q

ARF

A

asset reporting format
SCAP language
XML schema for expressing information about assets and their
relationships
● Vendor and technology neutral
● Flexible
● Suited for a wide variety of reporting application

38
Q

CCE

A

common configuration enumeration method for SCAP
Scheme for provisioning secure configuration checks across multiple
sources
● Provides unique identifiers for different system configuration issues

39
Q

CPE

A

(Common Platform Enumeration)
● Identifies hardware devices, operating systems, and applications
● Standard formatting

40
Q

CVSS

A

Common Vulnerability Scoring System (CVSS)
Used to provide a numerical score reflecting the severity of a vulnerability (0 to
10)
■ Scores are used to categorize vulnerabilities as none, low, medium, high, or
critical
■ Scores assist in prioritizing remediation efforts but do not account for existing
mitigations

41
Q

Benchmarks

A

Sets of security configuration rules for specific products to establish
security baselines
● Provide a detailed checklist that can be used to secure systems to a
specific baseline

42
Q

Red Hat Enterprise Linux Benchmark

A

Examples of SCAP Benchmarks
Provides security configuration rules for Red Hat Enterprise Linux

43
Q

FPC

A

full packet capture
Captures entire packets, including headers and payloads
Network and Flow Analysis

44
Q

Flow Analysis

A

Focuses on recording metadata and statistics about network traffic, saving
storage space
■ Doesn’t include the actual content, just the metadata
■ Rapidly generates visualizations to map network connections, traffic types and session volumes

45
Q

Flow Collector

A

Records metadata and statistics about network traffic
■ Collects information about the following
● Type of traffic
● Protocol used
● Data volume
■ Allows for efficient data storage and reduces processing overhead

46
Q

Netflow

A

Cisco-developed protocol for reporting network flow information
■ Also known as IPFIX (IP Flow Information Export)
■ Defines traffic flows based on shared characteristics (e.g., source and destination
IP)
■ Data collected by NetFlow
● Network protocol interface
● IP version and type
● Source and destination
● IP addresses
● Source and destination ports
● Type of service use

47
Q

Zeke

A

Hybrid tool for network monitoring
■ Monitors traffic like NetFlow but logs full packet captures based on interest
■ Filters or signatures trigger full packet capture to analyze specific data
■ Normalizes data for easy import into other tools for visualization and analysis

48
Q

MRTG

A

multi router traffic grapher
Creates graphs displaying network traffic flows through routers and switches
■ Uses SNMP (Simple Network Management Protocol) to gather data
■ Helps identify traffic patterns and anomalies by visualizing data transfer volumes

49
Q

SPOG

A

Single Pane of Glass
Central point of access for security teams
■ Provides access to information, tools, and systems for monitoring, managing, and
securing an organization’s IT environment
■ Offers a unified view of the security posture and facilitates informed
decision-making
● Can quickly and easily access critical information, aiding informed
decision-making