IS3230 CHAPTER 15 Flashcards

1
Q

A series of events gleaned from parsed log file repots over a period of time is called ___.

A

AUDIT TRAIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A list of known malicious behaviors that should be automatically denied is called ___.

A

BLACKLIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs when an intrusion detection system overlooks anomalous activity is called ___.

A

FALSE NEGATIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Occurs when an intrusion detection system labels normal activity as anomalous is called ___.

A

FALSE POSITIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of translating log files from various systems into a common format is called ___.

A

NORMALIZATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of translating and reformatting raw log files into useful reports is called ___.

A

PARSING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Regarding log files, the process of determining which log files and/or entries are important and may require action versus which are less important or informational only is called ___.

A

PRIORITIZATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A software package that centralizes and normalizes log files from a variety of applications and devices is called ___.

A

SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A list of known approved behaviors that should be automatically allowed is called ___.

A

WHITELIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. According to the CIA triad, the three pillars of information assurance are ___, ___, ___.
A

CONFIDENTIALITY
INTEGRITY
AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Non-reugidation provides the sender of information with which of the following?
  2. Read receipt
  3. Notification that the message was deleted without being opened
  4. Proof of delivery
  5. Notification that the message was forwarded to a third part by the original recipient
A

Proof of delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. The Parkerian hexad adds which elements to the CIA triad? (Select three)
  2. Possession or control
  3. Non-repudiation
  4. Authenticity
  5. Utility
  6. Authentication
A

Possession or control
Authenticity
Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Only security engineers need training in information assurance.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Timeliness is an important goal of any access control monitoring system.
    TRUE OR FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Intrusion detection systems that operate on the principle of misuse detection compare activity to a ___ of known suspicious events.
A

Blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Intrusion detection systems that operate on the principle of specification detection use a ___ to identify normal ranges of behavior.
A

Whitelist

17
Q
  1. Which type of events in an audit log report user logon attempts and system resource usage?
  2. System-level
  3. Application-level
  4. User-level
  5. Unauthorized access-level
A

System-level

18
Q
  1. Which events in an audit log report user authentication attempts, commands and applications used, and security violations committed by users?
  2. System-level
  3. Application-level
  4. User-level
  5. Unauthorized access-level
A

User-level

19
Q
  1. Which events in an audit log report error messages, file modifications, and security alerts generated by individual applications?
  2. System-level
  3. Application-level
  4. User-level
  5. Unauthorized access-level
A

Application-level

20
Q
  1. What is normalization?
  2. The process of rotating older audit logs into long-term storage
  3. The process of translating log files from various systems into a common format
  4. The process of separating normal events from anomalies
  5. The process of analyzing log files
A

The process of translating log files from various systems into a common format

21
Q
  1. Automated audit log analysis software makes manual log analysis unnecessary.
    TRUE OR FALSE
A

FALSE

22
Q
  1. An SIEM is which type of tool?
  2. Access control
  3. Risk analysis
  4. Audit log analysis
  5. Training
A

Audit log analysis