Ch. 8 Flashcards

1
Q

What are the three tiers a log management infrastructure typically comprises?

A
  • Log monitoring
  • Log analysis and storage
  • Log generation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are types of network-based attack?

A
  • Eavesdropping
  • Data Modification
  • IP Address Spoofing
  • Denial-of-Service Attack
  • Man-in-the-Middle Attack
  • Packet Sniffing
  • Enumeration
  • Session Hijacking
  • Buffer Overflow
  • Email Infection
  • Malware attack
  • Password-based attack
  • Router Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What attack floods the target with large amounts of invalid traffic exhausting resources available on the target?

A

Denial-of-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can an attacker exploit a network?

A

Through wired or wireless connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary reason for forensic investigators to examine logs?

A

To correlate the information across multiple log files to understand how an attack was conducted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is true about the transport layer in the TCP/IP model?

A

It is the backbone for data flow between two devices in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an ongoing process that returns results simultaneously so that the system or operators can respond to attacks immediately?

A

Real-time analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What attack is specific to wireless networks?

A

Jamming signal attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In what type of forensic examination do investigators perform an examination of logs to detect something that has already occurred in a network/device and determine what it is?

A

Postmortem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the most common MAC spoofing detection method in which investigators analyze the sequence number field in the MAC-layer frame header?

A

Sequence number-based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Event Correlation Approaches, which approach is used to monitor the computers’ and computer users’ behavior and provide an alert if something anomalous is found?

A

Role-based approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Investigators use what command to view the ARP table in Windows?

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What describes the implementation of sniffing, capturing, and analyzing network traffic and event logs to investigate a network security incident?

A

Network forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Indicators of Compromise (IOCs)

A
  • Unusual outbound network traffic
  • Uniform Resource Locators or URLs
  • User agent strings
  • Log-in anomalies
  • Increased number of requests for same file
  • Network traffic traversing on unusual ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What layer of the TCP/IP Model do the application layer, presentation layer, and session layer of the OSI model together form?

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What layer of the TCP/IP model do the data link layer and the physical layer of the OSI model together form?

A

Network access layer

17
Q

What type of network-based evidence provides a summary of a conversation between two network devices and includes an aggregation of metadata from network traffic, such as the destination IP and destination port, source IP and source port, start time of the session, and information exchanged during that session?

A

Session data

18
Q

What type of network-based evidence is gathered by capturing and storing all the packets following through a network without any filtration using a tool like tcpdump or wireshark and can assist investigators perform post-mortem analysis of a security incident?

A

Full Content Data

19
Q

What type of tool addresses the concern of managing increasing volumes of log data from multiple sources over a centralized platform to mitigate the chances of cyberattacks with real-time incident monitoring analysis?

A

Security information and event management (SIEM)

20
Q

A SIEM is composed of two layers, a base layer for log management and an additional layer for security analytics. The activities in both of these layers are distributed between the security information management (SIM) and the ______________.

A

security event management (SEM)

21
Q

What technique is used to assign a new meaning for relating a set of events that occur in a fixed amount of time where few important events are identified among a large number of events?

A

Event correlation

22
Q

What event correlation step compiles repeated events into a single event and avoids the duplication of the same event?

A

Event aggregation

23
Q

What event correlation step is the most complex and identifies all devices that became inaccessible due to network failures?

A

Root cause analysis

24
Q

What type of event correlation method is used when different operating systems (OS) and network hardware platforms are used in the network of an organization?

A

Cross-platform correlation

25
Q

What type of event correlation approach is an advanced correlation method based on statistics and probability theory that uses prior probabilities of conditions to predict what a hacker might do next after an attack?

A

Bayesian correlation

26
Q

A wireless access point can be termed rogue when it is installed within a trusted network without appropriate _____________.

A

authorization