LP - Security Monitoring & Alerting Flashcards

1
Q

Agent-based monitoring uses

A

lightweight software, known as a monitoring agent like SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Agentless monitoring uses

A

special application programming interface calls or requests or integrated code to track the devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of scanning tools

A
  • Wired and wireless IP scanners
  • Port scanners
  • Vulnerability scanners (Nessus)
  • Compliance scanning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scanning and Alerting Life Cycle

A
  1. Planning
  2. Implementation
  3. Testing and validation
  4. Response
  5. Remediation
  6. Archieving and Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SCAP stands for

A

Security Content Automation PRotocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SCAP?

A

(National Institute of Standards and Technology) for automating security vulnerability management, security measurement, and policy compliance evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARF stands for

A

asset reporting format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CPE stands for

A

Common Platform Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OVAL stands for

A

Open Vulnerability Assessment Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OCIL stands for

A

Open Checklist Interactive Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TMSAD stands for

A

Trust Model for Security Automation Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XCCDF stands for

A

Extensible Configuration Checklist Description Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SWID stands for

A

Software Identification Tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does SIEM do?

A

gathers event logs data from a range of sources and recognizes activity that diverges from the norm in real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SOAR stands for

A

Security Orchestration and Automation and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SOAR operates in three key areas:

A
  • Threat and vulnerability management
  • Incident response
  • Security operations automation
17
Q

Life cycle of SOAR

A
  1. Threat detection
  2. Notification
  3. Investigation
  4. Response
  5. Resolution
18
Q

Antivirus system use the following as form of detection:

A
  • Signature detection
  • Heuristic detection of files
  • Multicritera analysis (MCA)
  • sandbox or cloud analysis
  • HIPS - host bases prevention systems
19
Q

SNMP uses an invertered path

A

architecture

20
Q

Netflow is defined by its 5-tuple data collection points:

A
  1. source IP
  2. destination IP
  3. Source port
  4. destination port
  5. the protocol
21
Q

The most recent version of Netflow is version