Golosary Deck Flashcards

1
Q

Parser

A

A parser is a software component or program that analyzes input data (often text or code) to break it into smaller, structured parts for easier processing. It is widely used in fields like programming, natural language processing, and data analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

False Positives

A

Refers to an incorrect alert or notification generated by a security system, where a benign or legitimate action, file, or event is mistakenly identified as a threat or malicious activity. This often happens due to overly sensitive detection systems, misconfigurations, or outdated threat signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

False Negative

A

When a security system fails to detect a real threat or malicious activity, incorrectly classifying it as benign. This type of error is particularly dangerous because it allows threats to go unnoticed, leaving systems vulnerable to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dynamic analysis

A

Dynamic analysis is a method of evaluating software, systems, or applications by observing their behavior during runtime. Dynamic analysis involves running the program in a controlled environment to identify bugs, vulnerabilities, or performance issues that occur during execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Static Analysis

A

Static Analysis is a method of evaluating software by examining its source code, bytecode, or intermediate code without executing the program. It is widely used in software development to identify potential issues early in the development lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Netflow collector

A

A NetFlow collector is a critical component of a NetFlow monitoring system that receives, processes, and stores flow data exported from network devices like routers and switches. It is used to analyze network traffic and provide insights into bandwidth usage, traffic patterns, and potential security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SIEM Collectors

A

SIEM collectors are components within a Security Information and Event Management (SIEM) system that gather log and event data from various sources across an organization’s IT environment. These collectors play a crucial role in centralizing data for analysis, correlation, and threat detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DROP

A

DROP rule in iptables refers to silently disallowing a connection by discarding the packet without sending any response back to the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Replay attack

A

A replay attack is a type of network attack where an attacker intercepts valid data transmissions between two parties and fraudulently retransmits or delays them to deceive the receiver into performing unauthorized actions. The attacker does not need to decrypt the intercepted data; simply resending it can exploit the system’s trust in the original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly