Secure Operations 4.9 Flashcards

Use a situation to support an investigation

1
Q

Firewall log

A

Traffic Flows through the firewall. Source/Destination IP. Port Numbers, dispositions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Logs

A

Records events set to it by applications or programs running on the system. Any application has the capability of writing events in the application log. This includes, warnings, errors and routine messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Endpoint logs

A

A lot of data which can be seen on the endpoint. Log on events, Policy changes, System events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OS-specific security logs

A

Monitoring Apps. Brute force, file changes, Authentication details. Find problems before they happen. Brute force attacks, May require filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPS/IDS Logs

A

Provide information on known vulnerabilities. Common data point, Time stamp, Type or class of attack, Source and destination IP, Source and destination port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Logs

A

Switches, routers, access points, VPNS concentrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Metadata

A

Information which describes an other data sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerability scans

A

Will identify lack of security controls.
Misconfigurations will be identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Packet captures.

A

Analyse every bit and bite which is sent over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly