Configuring your SIEM Flashcards

1
Q

The first step in SIEM deployment to ensure it receives relevant event data.

A

Log source integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A method to reduce noise by filtering out non-security-related logs.

A

Log filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of converting raw log data into a consistent format for analysis.

A

Normalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of interpreting raw logs into labeled fields like IP, port, and action.

A

Log parsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A data source commonly integrated with SIEM for detecting external threats.

A

Firewall logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A log source that helps detect local user actions and system changes.

A

Endpoint logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A process that associates logs from different systems into a unified view.

A

Correlation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rules that trigger alerts when specific patterns or behaviors are detected.

A

SIEM detection rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An alert configuration that matches known bad indicators like IPs or hashes.

A

IOC-based rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An alert triggered by unusual behavior compared to historical data.

A

Anomaly-based alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A scheduled review and adjustment of detection logic to reduce false positives.

A

SIEM tuning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The part of SIEM responsible for storing, indexing, and retrieving historical data.

A

Log storage and retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A performance consideration when choosing how long to keep logs searchable.

A

Data retention policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A process to ensure incoming logs are trusted and haven’t been modified.

A

Log integrity validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of combining logs, alerts, and context into a single view of an incident.

A

Event correlation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A common log protocol used to send data to a SIEM over UDP or TCP.

17
Q

A SIEM feature that allows teams to track and manage the investigation process.

A

Case management or incident tracking

18
Q

Using thresholds to trigger alerts, such as “5 failed logins in 1 minute.”

A

Threshold-based detection

19
Q

A SIEM configuration that aggregates data from cloud platforms like AWS or Azure.

A

Cloud log integration

20
Q

The action of creating custom rules tailored to the organization’s unique environment.

A

Rule customization