Module 3 - 02-1 Flashcards

Security information and event management (SIEM) dashboards

1
Q

Define Log

A

A record of events that occur within an organization’s systems and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three common log sources?

A
  • Firewall logs
  • Network logs
  • Server logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Firewall logs

A

A record of attempted or established connections for incoming traffic from the internet. It also includes outbound requests to the internet from within the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Network logs

A

A record of all computers and devices that enter and leave the network. It also records connections between devices and services on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Server logs

A

A record of events related to services such as websites, emails, or file shares. It includes actions such as login, password, and username requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can security teams identify from monitoring logs (2)?

A
  • Vulnerabilities
  • Potential data breaches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do SIEM tools rely on to monitor systems and detect security threats?

A

Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SIEM stand for?

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Security Information and Event Management (SIEM)

A

An application that collects and analyzes log data to monitor critical activities in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do SIEM tools increase efficiency and save time?

A

SIEM tools index and minimize the number of logs a security professional must manually review and analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SIEM tools can also be used to create _____.

A

dashboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do SIEM dashboards help security analysts?

A

SIEM dashboards help security analysts quickly and easily access their organization’s security information as charts, graphs, or tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Metrics

A

Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can SIEM dashboards be customized?

A

SIEM dashboards can be customized to display specific metrics or other data that are relevant to different members in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does IoT stand for?

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is “interconnected devices with access to the internet” known as?

A

Internet of Things (IoT)

17
Q

What does AI stand for?

A

Artificial Intelligence (AI)

18
Q

What does ML stand for?

A

Machine Learning (ML)

19
Q

What does SOAR stand for?

A

Security Orchestration, Automation, and Response

20
Q

Define Security Orchestration, Automation, and Response (SOAR)

A

A collection of applications, tools, and workflows that uses automation to respond to security events

Essentially, this means that handling common security-related incidents with the use of SIEM tools is expected to become a more streamlined process requiring less manual intervention.

21
Q

Which log source records events related to websites, emails, and file shares, as well as password and username requests?

  • Firewall
  • Server
  • Receiving
  • Network
A

Server

Server logs record events related to websites, emails, and file shares. They include actions such as login requests, password and username requests, as well as the ongoing use of these services.

22
Q

A security information and _____ management (SIEM) tool is an application that collects and analyzes log data to monitor critical activities in an organization.

  • efficiency
  • event
  • employee
  • emergency
A

event

23
Q

A security professional evaluates a software application by reviewing key technical attributes including response time, availability, and failure rate. What are they using to assess performance?

  • Models
  • Index standards
  • Metrics
  • Cloud tools
A

Metrics

They are using metrics. Metrics are key technical attributes including response time, availability, and failure rate, which are used to assess the performance of a software application. SIEM dashboards can be customized to display relevant metrics.

24
Q

SIEM tools must be configured and _____ to meet each organization’s unique security needs.

  • customized
  • centralized
  • reviewed
  • indexed
A

customized