Chapter 21: Security Operations Flashcards

1
Q

Tier 1 security analysts

A

monitor security tools and platforms for suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tier 2 security analysts

A

investigate alerts, declare security incidents, coordinate with incident responders and intelligence analysts to investigate, contain, and eradicate threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Intelligence

A

evidence-based knowledge of an existing or emerging menace or hazard to assets used to inform decisions regarding responses to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three types of threat intel sources

A

threat data feeds, open-source intelligence (OSINT), and internal systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cyberthreat hunting

A

practice of proactively looking for threat actors in your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

firewalls support and enforce org’s network security policy by …

A

restricting access to one network from another network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

packet-filtering firewalls

A

make access decisions based on network-level protocol header values using access control lists (ACLs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

stateful firewalls

A

add to the capabilities of packet filtering firewalls by keeping track of the state of a connection between two endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

proxy firewalls

A

intercept and inspect messages before delivering them to the intended recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NGFW

A

next-generation firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

next-generation firewall

A

combines the attributes of others firewalls, but adds a signature-based and/or behavioral analysis IPS engine and cloud-based threat data sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDS/IPS

A

intrusion detection and prevention systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

intrusion detection and prevention systems

A

categorized as either host-based or network based and rule-based or anomaly-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HIDS

A

host-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIDS

A

network-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly