Section 23: Monitoring and Auditing Flashcards

1
Q

Signature Based Monitoring

A

Network traffic is analyzed for predetermined attack patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anomaly-based Monitoring

A

A baseline is established and any network traffic that is outside of the baseline is evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Behavior-based Monitoring

A

Activity is evaluated based on the previous behavior of applications, executables, and the OS in comparison to the current activity of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baselining

A

Process of measuring changes in networking, hardware, software, and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Posture

A

The amount of risk you want to take in; it’s like the target you want to reach in your security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a protocol analyzer?

A

Captures and analyzes network traffic; can be connected in promiscuous mode (captures everything) or non-promiscuous mode (only capturing packets address to the specific machine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port Mirroring

A

One more switch ports are configured to send their packets to another switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SNMP

A

Aids in monitoring network-attached devices and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Agents

A

Software that is loaded onto the system so you can manage it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SNMPv3

A

Version of SNMP that provides integrity, authentication, and encryption of the messages being sent over the network (don’t use 1 and 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logs are considered as being part of ______

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logs

A

Data files that contain the accounting an audit trail for actions performed by a user on the computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Logs

A

Logging on and off the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

System Logs

A

crashing, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application Logs

A

Logs the events for the OS and third party apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SYSLOG uses what port?

A

514 UDP

17
Q

Log File Maintenance

A

Actions taken to ensure the proper creation and storage of a log file, such as the proper configuration, saving, backing up, securing and encrypting of the log files

18
Q

Log files should not be saved on _________

A

the same device on which the logs are collected

19
Q

Protecting Logs. How do you do it?

A

Save your logs to an encrypted folder on the server and have good backup processes in place

20
Q

SIEM

A

A solution that provides real time or near real time analysis of security alerts generated by network hardware and applications

21
Q

Syslog

A

Allows you to collect your logs and send them to a central server

22
Q

SOAR

A

Security Orchestration, Automation, and Response - A class of security tools that facilitates incident response, threat hunting, and security configuration by orchestrating automated runbooks and delivering data enrichment (think of it as SIEM 2.0)

23
Q

Playbook

A

A checklist of actions to perform to detect and respond to a specific type of incident

24
Q

Runbook

A

An automated version of a playbook that leaves clearly defined interaction points for human analysis