Investigating an Incident Flashcards

1
Q

What is the purpose of dashboards in incident investigation?

A

Provide high-level insights

Dashboards give an initial overview of the security landscape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do vulnerability scans aim to identify?

A

System vulnerabilities

They serve as a foundation for understanding potential entry points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of packet captures in network security?

A

Capture and analyze network traffic

They reveal communication patterns and potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do firewall logs monitor?

A

Network traffic and detect unauthorized access

They are crucial for identifying security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of events do application logs record?

A

Application-specific events

They help identify abnormal behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do endpoint logs capture?

A

Activities on individual devices

They provide insights into device-level security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the function of OS-specific security logs?

A

Monitor operating system security events

They are essential for tracking OS vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do IPS and IDS logs track?

A

Intrusion attempts and system compromises

They help in detecting and responding to security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do network logs record?

A

Network activities and connections

They are used to analyze network behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of metadata in incident investigations?

A

Provide contextual information about other data sources

Useful for understanding details about events, calls, emails, and web visits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a SIEM?

A

Security Information and Event Monitoring System

It provides real-time analysis of security alerts from applications and network hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a vulnerability scan report include?

A

Report ID, scan date and time, system/software version, scan initiator, executive summary

It highlights themes and trends for large networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are false positives in vulnerability scanning?

A

Vulnerabilities reported that don’t actually exist

Differentiating real vulnerabilities from false positives is crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of automated reports in security?

A

Provide information about network security aspects

They are generated by computer systems, often from antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key elements of an automated security incident report?

A

Report ID, generation date, report period, prepared by, executive summary

These elements help in understanding the report’s relevance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does an executive summary in an incident report provide?

A

A brief overview of the report’s content

It helps readers determine the report’s relevance.

17
Q

What is the purpose of packet capture?

A

Captures data going to or from a network device

It can reveal patterns indicating attack types.

18
Q

What does NetFlow do?

A

Collects active IP network traffic data

It provides information on source, destination, volume, and paths.

19
Q

What is the significance of MD5/SHA256 checksums?

A

They serve as unique digital fingerprints for file identification

This includes potential malware identification.

20
Q

What does a packet capture display typically include?

A

Packet sequence number, elapsed time, source/destination IP addresses, protocol, length

This information helps analyze network traffic.

21
Q

What is the function of JournalCTL?

A

Querying and displaying logs from the Journal Daemon

It is part of SystemD’s logging service.

22
Q

What is the purpose of a single pane of glass in security monitoring?

A

A single screen for analysts to access everything across the organization

It simplifies the analysis process.