Day4 labs Log monitoring Flashcards

1
Q

Two Main Log Sources:

A

Host-Centric Logs
Network-Centric Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Logs that originate from inside a system (the host). Examples:

File access

Login attempts

Processes running

Registry modifications

A

Host-Centric Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logs that show interaction between systems. Examples:

SSH connections

FTP file access

Web traffic

VPN connections

A

Network-Centric Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is Registry Activity host- or network-centric?

A

host-Centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is VPN activity host- or network-centric?

A

Network-Centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

……………..Adding extra information to logs (e.g., resolving IPs to locations, tagging users, identifying threat intel indicators).

A

Enrichment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Logs can be stored in

A

Local Systems: Where the logs are generated.

Centralized Repositories: Like internal servers or SIEM tools.

Cloud Storage: Services like AWS S3, Azure Blob, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Log Retention

A

Hot Storage 0–6 months Fast access, real-time queries, often used in daily ops.

Warm Storage 6 months–2 years Slightly slower, used for historical analysis.

Cold Storage 2–5 years Archived, compressed, not easily accessible, long-term use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Log Deletion

A

Why deletion must be controlled:

You don’t want to delete logs that might still be useful.

Deletion must follow retention and backup policies.

Always back up critical logs before deletion.

📏 Why organizations delete logs:

Keep logs manageable for analysis.

Comply with regulations like GDPR (don’t keep unnecessary user data).

Reduce storage and processing costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

YARA and Sigma

A

YARA: Used for identifying and classifying malware samples based on textual or binary patterns.

Sigma: A generic signature format for SIEM systems, allowing the creation of rules to detect suspicious log events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly