Module 4 - 01-1 Flashcards

Important Cybersecurity Tools

1
Q

Define Log

A

A record of events that occur within an organization’s systems.

Logs help security professionals identify vulnerabilities and potential security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does SIEM stand for?

A

Security Information and Event Management (SIEM)

(pronounced as ‘sim’ or ‘seem’)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define SIEM tool

A

An application that collects and analyzes log data to monitor critical activities in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a SIEM tool work?

A
  • It collects real-time information, and allow security analysts to identify potential breaches as they happen.
  • It reduces the amount of data an analyst must review by providing alerts for specific types of risks, threats, and vulnerabilities.
  • It provides a series of dashboards that visually organize data into categories, allowing users to select the data they wish to analyze.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Dashboard

A

A tool used to visually communicate information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How would a security analyst use a SIEM tool?

A
  • Analyze filtered events and patterns
  • Perform incident analysis
  • Proactively search for threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two examples of SIEM tools?

A

1) Splunk
2) Chronicle (Google)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Splunk?

A

A data analysis platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Splunk Enterprise and what do they provide?

A

A self-hosted tool used to retain, analyze, and search an organization’s log data.
It provides SIEM solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Chronicle?

A

A cloud-native SIEM tool that stores security data for search and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Playbook

A

A manual that provides details about any operational action, such as how to respond to an incident.

The purpose is to guide analysts through a series of steps to complete specific security-related tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is another name for a Network Protocol Analyzer?

A

Packet Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Network Protocol Analyzer (Packet Sniffer)

A

A tool designed to capture and analyze data traffic within a network.
The tool keeps a record of all the data that a computer within an organization’s network encounters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two common network protocol analyzers?

A

1) tcpdump
2) Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two important playbooks that occur at the beginning of a forensic investigation?

A

1) Chain of Custody Playbook
2) Protecting and Preserving Evidence Playbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Chain of Custody

A

The process of documenting evidence possession and control during an incident lifecycle

17
Q

Briefly explain the Chain of Custody process

A

As a security analyst involved in a forensic analysis, you will work with the computer data that was breached. You and the forensic team will also need to document who, what, where, and why you have the collected evidence. The evidence is your responsibility while it is in your possession. Evidence must be kept safe and tracked. Every time evidence is moved, it should be reported. This allows all parties involved to know exactly where the evidence is at all times.

18
Q

Define Protecting and Preserving Evidence

A

The process of properly working with fragile and volatile digital evidence

19
Q

Define Order of Volatility

A

A sequence outlining the order of data that must be preserved from first to last

It prioritizes volatile data, which is data that may be lost if the device in question powers off, regardless of the reason.

20
Q

What tool is designed to capture and analyze data traffic within a network?

  • network protocol analyzer (packet sniffer)
  • playbook
  • security information and event management (SIEM)
  • Structured Query Language (SQL)
A

network protocol analyzer (packet sniffer)

A packet sniffer, also known as a network protocol analyzer, is a tool designed to capture and analyze data traffic within a network.

21
Q

What type of tool uses dashboards to organize data into categories and allows analysts to identify potential security incidents as they happen?

  • Linux
  • SIEM
  • network protocol analyzers (packet sniffers)
  • Python
A

SIEM

SIEM tools use dashboards to organize data into categories and allow analysts to identify potential security incidents, such breaches, as they happen.

22
Q

What can cybersecurity professionals use logs for?

  • To identify vulnerabilities and potential security breaches
  • To research and optimize processing capabilities within a network
  • To analyze data traffic within a network
  • To select which security team members will respond to an incident
A

To identify vulnerabilities and potential security breaches

Cybersecurity professionals can use logs to identify vulnerabilities and potential security breaches, as well as other potential security incidents.

23
Q

A _____ is a manual that provides details about operational actions.

  • playbook
  • case history
  • checklist
  • directory
A

playbook

A playbook is a manual that provides details about operational actions. Playbooks provide guidance when handling a security incident before, during, and after it has occurred.