AlertingMonitoring Flashcards

1
Q

System monitoring

A

Observation of computer systems including the utilization and consumption of its resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Monitoring Resources Types

A

System, application, and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Alerting and Monitoring Activity Types

A

Log aggregation, alerting, scanning, reporting, archiving, and alert (response|remediation|validation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Log Aggregation

A

Process of collecting/consolidating log data from various sources into one location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Simple Network Management Protocol (SNMP)

A

Internet protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SNMP Type of messages

A

GET, SET, TRAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agent

A

A service/application set on the tracking device to send/replicate commands from the controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TRAP messages

A

Alert/events sent from the agent to the controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Granular TRAP

A

Sent TRAP messages get a unique identifier to distinguish each message as a unique message being received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Management Information Base (MIB)

A

Used to describe the structure or the management data of a device’s subsystem using hierarchal namespace collecting object identifiers; TRAP messages are sent with this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Simple Network Management Protocol (SNMP) Types

A

TRAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Verbose

A

Configured to contain all the information of a given alert/event as a payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Information and Event Management (SIEM)

A

Solution that provides real-time or near real-time analysis of security alerts that are generated by network hardware applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SIEM Tools

A

Splunk, ELK or Elastic Stack, ArcSight, QRadar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data from Security Tools Types

A

Antivirus, Data Loss Preventions, Network Intrusion Detection, Network Intrusion Prevention, Firewalls, Vulnerability Scaners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Intrusion Detection Systems

A

Passively identifies any threats.

17
Q

Network Intrusion Protection Systems

A

Actively identifies any threats and blocks/prevents.

18
Q

Security Content Automation Protocol (SCAP)

A

Open standards that automate vulnerability management, measurements, and policy compliance for systems in an organization; Essentially a Foundation that must be followed between languages.

19
Q

SCAP Languages

A

OVAL, XCCDF, ARF.

20
Q

Open Vulnerability and Assessment Language (OVAL)

A

XML schema for describing system security states and querying vulnerabilities reports/info.

21
Q

Extensible Configuration Checklist Description Format (EXCCDF)

A

XML schema for developing and auditing best practice configuration checklists and rules.

22
Q

Asset Reporting Format (ARF)

A

XML schema for expressing information about assets, relationships between assets and reports.

23
Q

SCAP languages Enumeration Techniques

A

CCE, CPE, CVE.

24
Q

Common Configuration Enumeration (CCE)

A

Scheme for provisioning secure configuration checks across multiple sources.

25
Common Platform Enumeration scheme (CPE)
Scheme for identifying hardware devices, OS and applications.
26
Common Vulnerabilities and Exposure (CVE)
List of records where each item contains a unique identifier used to describe a publicly known vulnerability.
27
Common Vulnerability Scoring System (CVSS)
Used to provide a numeric score to reflect the severity of a given vulnerability.
28
Flow Analysis
Relies on a flow collector which records metadata and statistics rather than recording full packets like Full Packet Capture (FPC).
29
NetFlow
Developed by Cisco to report network flow into a database.
30
IP Flow Information Export (IPFIX)
The standard created by NetFlow; Defined traffic flow based on shared packet characteristics.
31
Zeek
Passively monitors a network like a sniffer but only logs full packet capture data of potential interest.
32
Multi-Router Traffic Grapher (MRTG)
Creates graphs showing traffic flows through the network interfaces of routers and switches by polling the applications using SNMP.
33
Single Pane of Glass
A central pattern of access for all the information, tools, and systems.