Network Monitoring Flashcards

1
Q

Simple Network Management Protocol (SNMP)

A

Sends and receives data from managed devices back to a centralized network management station

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Granular (SNPM)

A

Sent trap messages get a unique objective identifier to distinguish each message as a unique message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Management Information Base (MIB)

A

The structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Verbose

A

SNMP traps may be configured to contain all the information about a given alert or event as a payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SNMP Trap

A

SNMP PDU an unrequested message an agent can send the MIB to notify about an important event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

System Logging Protocol (Syslog)

A

Sends system log or event messages to a central syslog server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Audit Log / Audit Trail

A

Contains a sequence of events for a particular activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application Log (Windows)

A

Contains information about software running on a client or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Log (Windows)

A

Contains information about the security of a client or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

System Log (Windows)

A

Contains information about the OS itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Windows Logs entry levels

A

Informational
Warning
Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Information and Event Management (SIEM)

A

Provides real-time or near-real-time analysis of security alerts generated by network hardware or applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Information and Event Management (SIEM) Log Collection

A

*Provides important forensic tools
*Helps address compliance reporting requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Information and Event Management (SIEM)
Normalization

A

*Nomalize data into a common model
*Maps log messages into a common data model,
*Connect and analyze related events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Information and Event Management (SIEM)
Correlation

A

Links the logs and events from different systems or applications into a single data feed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Information and Event Management (SIEM)
Aggregation

A

*Reduces the volume of event data
*Consolidates duplicate event records and merge into a single record

17
Q

Security Information and Event Management (SIEM)
Reporting

A

Real-time monitoring dashboards for analysts
*Long-term summaries for management

18
Q

Protocol used by Security Information and Event Management (SIEM)

A

Syslog protocol
UDP 514 / TCP 1468

19
Q

Benefits of patch management

A
  1. Security
  2. Uptime
  3. Compliance
  4. Improve Features
20
Q

Steps of patch management

A
  1. Planning
  2. Testing
  3. Implementation
  4. Auditing
21
Q

Planning (Patch Management)

A

Track available patches and updates
* Determines how to test and deploy each patch

22
Q

Testing (Patch Management)

A

Test any patch received from a manufacturer prior to automating its deployment through the network

23
Q

Implementation (Patch Management)

A

Deploy the patch to all of the workstations and servers that require it

24
Q

Auditing (Patch Management)

A

Scan the network and determines if the patch was installed properly and if there are any unexpected failures that may have occurred

25
Q

Signature-based Detection

A

Signature contains strings of bytes (a pattern) that triggers detection

26
Q

Policy-based Detection

A

Relies on specific declaration of the security policy

27
Q

Statistical Anomaly-based Detection

A

Watches traffic patterns to build baseline

28
Q

Non-Statistical Anomaly-based Detection

A

Administrator defines the patterns/baseline

29
Q

Managed Device

A

Any device that can communicate with an SNMP manager known as the management information base (MIB)

30
Q

5 Elements of SIEM (Security Information and Event Management)

A
  1. Log Collection
  2. Normalization
  3. Correlation
  4. Aggregation
  5. Reporting