day 1 Flashcards

1
Q

network analysis tools and techniques

A

security specialists need continuous intelligence about the behavior of workstations, servers, network devices, and applications to efficiently monitor and enhance the security posture and operations of their network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network baselining

A

a baseline is a statistical profile of a certain performance metric-network device or application utilization, response time, or volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

historical baselines reflect traditional (normal) network operations. normal traffic includes:

A
  • traffic type
  • volume of each traffic type
  • direction, flow of each traffic type
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

detecting security breaches

A

in detecting security breaches, the most beneficial data sources will be those that give detailed network utilization and application volume of the network and its applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

baselining methods and techniques

A
  • top to bottom network monitoring
  • application monitoring
  • detailed packet analysis
  • continuous traffic capture
  • threshold alarms
  • packet analysis methodology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

top to bottom monitoring

A

a solution must provide the capability to see the network from a high-level holistic (summary) perspective to pinpoint trouble spots quickly

most used to least used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

application monitoring

A
types of application monitoring include:
well-known
web-based
complex
custom
unknown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

detailed packect analysis

A

detailed packet-level analysis allows the security specialist to identify the specific code used in an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

continuous traffic capture

A

solutions must supply a means to continuously capture and store a complete packet by packet network traffic audit trail for several days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

threshold alarms

A

threshold alarms can be set based upon the network baseline previously developed. These alarms alert the security specialist when a specific metric has been exceeded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

packet analysis methodology

A
plan
deploy
capture
analyze
refine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

common network traffic

A

there are two basic categories of protocols:
binary-transmit commands as binary info
textual-transmit commands in a text format….HTTP, HTTPS, SMTP, POP, IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

study protocols on page

A

do it!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ethernet header

A

makes up the first 14 bytes of the ethernet frame (662)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

next protocol types

A

0800 IPv4
0806 ARP
86dd IPv6

values less than 1500 (or ones not listed above!) indicate a length field and is not a protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

filtering the ethernet header in wireshark

A

header. field operater value
eth. src ==
eth. dst ==
eth. addr ==

17
Q

tcp dump

A

syntax is:
tcpdump -nc 2 -e ip

lists the source:destination MAC followed by next protocol