Ch. 8 Flashcards
What are the three tiers a log management infrastructure typically comprises?
- Log monitoring
- Log analysis and storage
- Log generation
What are types of network-based attack?
- Eavesdropping
- Data Modification
- IP Address Spoofing
- Denial-of-Service Attack
- Man-in-the-Middle Attack
- Packet Sniffing
- Enumeration
- Session Hijacking
- Buffer Overflow
- Email Infection
- Malware attack
- Password-based attack
- Router Attacks
What attack floods the target with large amounts of invalid traffic exhausting resources available on the target?
Denial-of-service
How can an attacker exploit a network?
Through wired or wireless connections.
What is the primary reason for forensic investigators to examine logs?
To correlate the information across multiple log files to understand how an attack was conducted.
What is true about the transport layer in the TCP/IP model?
It is the backbone for data flow between two devices in a network.
What is an ongoing process that returns results simultaneously so that the system or operators can respond to attacks immediately?
Real-time analysis
What attack is specific to wireless networks?
Jamming signal attack
In what type of forensic examination do investigators perform an examination of logs to detect something that has already occurred in a network/device and determine what it is?
Postmortem
What is the most common MAC spoofing detection method in which investigators analyze the sequence number field in the MAC-layer frame header?
Sequence number-based detection
In Event Correlation Approaches, which approach is used to monitor the computers’ and computer users’ behavior and provide an alert if something anomalous is found?
Role-based approach
Investigators use what command to view the ARP table in Windows?
arp -a
What describes the implementation of sniffing, capturing, and analyzing network traffic and event logs to investigate a network security incident?
Network forensics
Network Indicators of Compromise (IOCs)
- Unusual outbound network traffic
- Uniform Resource Locators or URLs
- User agent strings
- Log-in anomalies
- Increased number of requests for same file
- Network traffic traversing on unusual ports
What layer of the TCP/IP Model do the application layer, presentation layer, and session layer of the OSI model together form?
Application layer