CH23 Monitoring and Auditing Flashcards

1
Q

What are 3 Automated ways to monitor activities?

A

signature-based, anomaly-based, or behavior-based

  1. Signature-based monitoring – network traffic is analyzed for predetermined attack patterns
  2. Anomaly-based monitoring – a baseline is established and any network traffic that is outside of the baseline is evaluated. (looking for something that is outside of ordinary)
  3. Behavior-based monitoring – activity is evaluated based on the previous behavior of applications, executables, and the operating system in comparison to the current activity of the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Signature-based monitoring?

A

network traffic is analyzed for predetermined attack patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Anomaly-based monitoring?

A

a baseline is established and any network traffic that is outside of the baseline is evaluated. (looking for something that is outside of ordinary)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Behavior-based monitoring?

A

activity is evaluated based on the previous behavior of applications, executables, and the operating system in comparison to the current activity of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Security Posture?

A

Risk level to which a system or other technology element is exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Perfmon.exe ?

A

Windows program for performance monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Protocol Analyzers?

A

it is used to capture and analyze network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Promiscuous mode in Protocol Analyzers?

A

Network adapter is able to capture all of the packets on the network regardless of the destination MAC address of the frames carrying them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Non-promiscuous mode in Protocol Analyzers?

A

Network adapter can only capture the packets addressed to itself directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Port mirroring?

A

one or more switch ports are configured to forward all of their packets to another port on the switch. This port is normally called a SPAN port

Port mirroring can slow down the network speed and cause packets to drop. To avoid, this, you can network tap.
If cannot configure a SPAN port, then you can use a network tap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Network Tap?

A

a physical device that allows you to intercept the traffic between two points on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SNMP ?

A

SNMP = Simple Network Management Protocol

A TCP/IP protocol that aids in monitoring network-attached devices and computers.

SNMP is incorporated into a network management and monitoring system

For the exam, know the function of SNMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Managed Devices in regards to SNMP?

A

Computers and other network-attached devices monitored through the use of agents by a network management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Agent in regards to SNMP?

A

software that is loaded on a managed device to redirect information to the network management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Network Management System (NMS) in regards to SNMP?

A

Software run on one or more servers to control the monitoring of network-attached devices and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 3 different versions on SNMP ?

A

SNMP v1, SNMP v2, SNMP v3

SNMP v1/v2 are insecure due to the use of community strings to access a device.

SNMP v3 – provides integrity, authentication, and encryption of the messages bring sent over the network.

17
Q

What is Manual audit?

A

look at security logs, ACLs, User rights/ permissions, group policies, vulnerability scans, written organizational policies, and interview personnels.

For the exam : logs are part of auditing

18
Q

What are three types of logs in Windows?

A

Security log - logs the events such as successful and unsuccessful user logons to the system

System log - logs the events such as a system shutdown and driver failures

Applications logs - logs the events for the operating system and third-party applications

On the exam : you might get a question like : “If you are trying to find when a user was successfully logged onto a system, which log would you look at?”. With the choices, Security, Application, or System log. Know that it’s a security log

19
Q

What is SYSLOG ?

A

a standardized format used for computer message logging that allows for the separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them.

To consolidate all the logs into a single repository, you can use SYSLOG.

20
Q

What is SYSLOG server?

A

different servers around the world sending their log files back to a single logging server.

SYSLOG uses port 514 over UDP

21
Q

What is Write Once Read Many (WORM) ?

A

technology like DVD-R that allows data to be written only once but read unlimited times.

On the exam: anytime you’re trying to protect something from prying eyes, anytime you want to make sure that you keep people out from seeing things, encryption is a great choice.

22
Q

What is SIEM ?

A

SIEM = Security Information and Event Monitoring system

a solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications.

SIEM solution can be implemented as software, hardware appliances, or outsourced managed services

23
Q

What are some of the commercial SIEM applications?

A

Splunk - Market-leading big data information gathering and analysis tool that can import machine-generated data via a connector or visibility add-on

ELK/Elastic Stack
ArcSight
QRadar
Alien Vault and OSSIM (Open-Source Security Information Management)
Graylog

For the exam: if you hear any of these names, you should know they have the ability to act as a SIEM.

24
Q

What is Syslog?

A

a protocol enabling different appliances and software applications to transmit logs or event records to a central server

Syslog follows a client-server model and is the de facto standard for logging of events from distributed systems.

Port 514 UDP
Port 1468 TPC/IP (newer version called syslog-ng or rsyslog)

25
Q

What is Security Orchestration, Automation, and Response (SOAR) ?

A

a class of security tools that facilitates incident response, threat hunting, and security configuration by orchestrating automated runbooks and delivering data enrichment

SOAR is primarily used for incident response.

SOAR is essentially Next generation SIEM - a security information and event monitoring system with an integrated SOAR

SOAR gives you :
* Scan security / threat data
* Analyze it with Machine Leaning (ML)
* Automate data enrichment
* Provision new resources.

26
Q

What is Playbook in regards to monitoring?

A

checklist of actions to perform to detect and respond to a specific type of incident

27
Q

What is Runbook in regards to monitoring?

A

an automated version of a playbook that leaves clearly defined interaction points for human analysis