Chapter 2 - Monitoring Networks Flashcards

1
Q

Rene

What were originally introduced to help troubleshoot network problems?

A

page 46.

Network Monitors, AKA sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rene

What is Promiscuous Mode?

A

page 46.
Simply means that the network card looks at any packet that it sees on the network, even if that packet is not addressed to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rene

What log contains various events logged by applications or programs.

A

page 47.

Application Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rene

Which Log has successful and unsuccessful logon attempts and records events related to resource use, such as creating, opening or deleting file or other objects.

A

page 47.

Security Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rene

What are the options in Event Viewer that allow you to perform certain actions?

A

page 51.
Saving the Log file in (evt, txt or csv format), opening saved logs, filtering the log file and viewing or changing properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rene

What is Hardening?

A

page 52.

A general process of making certain that the operating system itself is as secure as it can be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rene

True or False
Part of OS Hardening is disabling unneccessary services.

A

page 53

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rene

What is RPC

A

page 53
Remote Procedure Call
Is a programming interface that allows a remote computer to run programs on a local machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rene

True or False
It is considered a security best practice to remove unneeded software

A

page 55

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rene

What is a patch?

A

page 56

Is an update to a system, sometimes a patch adds new functionality; in other cases, it corrects a bug in the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rene

What are the three types of patches?

A

page 57
Service Pack
Updates
Security Updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rene

What is IDS?

A

page 64
Intrusions Detection System
Focused on detecting intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rene

What is IPS?

A

page 64
Intrusion Prevention System
Focused in preventing intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rene

How does a “Honeypot” work?

A

page 64

Draw attackers away from higher-value system or allows administrators to gain intelligence about an attack strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rene

How does a “Honeynet” work?

A

page 64
Creates a synthetic network that can be run on a single computer system and is attached to a network using a normal Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rene

What is the process of luring someone into your plan or trap, by using free stuff or a challenge?

A

page 65

Enticement

17
Q

Rene

What is the process in which a law enforcement officer or a government agent encourages or induces a person to commit a crime when the potential criminal expresses a desire not to go ahead?

A

page 65

Entrapment

18
Q

Rene

True or False
Enticement and Entrapment are both legal in the US, but not legal in Canada.

A

page 65

False

19
Q

Rene

What are Alarms?

A

page 63

Are indications that there is an ongoing CURRENT problem.

20
Q

Rene

What are Alerts?

A

page 63

Are issues to which you need to pay attention, but are not about to bring the system down at any moment.

21
Q

Rene

What are Trends?

A

page 63
Trends in threats, example;
Last month, spear phishing attacks been increasing.

22
Q

Rene

What are Security Audits and what do they include?

A

page 62
An integral part of continuous security monitoring. they include;
* Review of security logs
* Review of policies and compliance with policies
* A check of security device configuration
* Review of incident response reports

23
Q

Rene

What are the settings for Remediation Policy?

A

page 62

  • Minor
  • Serious
  • Critical
24
Q

Rene

What are methods of Security the Network?

A
page 60
Using the following concepts;
* MAC Limiting and Filtering
* 802.1X
* Disable Unused Ports
* Rogue Machine Detection
25
Q

Rene

What types of accounts should you disable?

A

page 58

  • Employees who have left the company
  • Temporary Employees
  • Default Guest Accounts