Lecture 4 pt. 2 Flashcards

1
Q

What is network monitoring used for?

A

To monitor all activities on a network and collect data from bandwidth usage, packet loss, and latency.

It helps identify and troubleshoot problems with the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the three primary metrics measured in network monitoring.

A
  • Availability (uptime)
  • Performance (data transfer speeds)
  • Configuration (system inventory, application and hardware settings)

These metrics set a baseline for data-at-rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Network Security Monitoring (NSM) do?

A

Detects and responds to security threats on a network.

It collects data from network traffic patterns, unusual login attempts, and malware infections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the goals of network security monitoring?

A
  • Simplified security testing
  • Prevention of unwanted operational disruptions
  • Strengthened security strategies

These goals help in compliance with industry standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: Network monitoring and network security monitoring are completely distinct tools.

A

False

Both tools overlap in functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are common sources of alerts in network security monitoring?

A
  • IDS/IPS
  • SIEM products
  • Antimalware software alerts
  • File integrity checking software
  • Managed Security Service Providers (MSSP)

MSSPs provide outsourced monitoring and management of security devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define True Positive in the context of alert evaluation.

A

The alert has been verified to be an actual security incident.

This indicates a successful detection of a security threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a False Positive?

A

The alert does not indicate an actual security incident.

Benign activity that results in a false positive is sometimes referred to as a benign trigger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does True Negative signify?

A

No security incident has occurred; the activity is benign.

This indicates that the system is functioning correctly without any threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a False Negative?

A

An undetected incident has occurred.

This can lead to serious security breaches if not identified promptly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is retrospective security analysis (RSA)?

A

The process of applying newly obtained rules or threat intelligence to archived network security data.

This can help identify previously undetected vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is session data in network security?

A

The record of the conversation between two hosts, including session ID and the amount of data transferred.

It provides insights into the interactions between network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does transaction data consist of?

A

Messages exchanged during network sessions, including client requests and server replies.

This data can be viewed in packet capture transcripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does full packet capture provide?

A

The most detailed data collected, including the actual content of conversations.

It can help analyze malware or violations of security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the most popular tool to review full packet captures?

A

Wireshark

It is widely used for analyzing detailed network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly