Security Operations Flashcards
Security professionals often discuss two general conceptual classes of intrusion security mechanisms:
intrusion detection systems (IDSs) and intrusion prevention systems (IPSs).
intrusion prevention system (IPS) is a solution that
monitors the environment and automatically takes action when it recognizes malicious attempts to gain unauthorised access.
IDS/IPS solutions can be deployed as
Perimeter placement
Host-based
Network-based
IDS/IPS can detect malicious activity in a number of ways
Deviation
Signature
Pattern matching
Heuristic
SIEM
Security Information and Event Management (system)
ISCM
Information Security Continuous Monitoring
DLP
Data loss protection
DLP tools function by
comparing data leaving the control of the organization against a rule set to determine whether that action is allowed
The DLP rule set can be defined by the following
Signature, Pattern Matching, Labelling
UEBA
User and Entity Behaviour Analytics
Perhaps the most striking example of the limitations of monitoring tools was shown in the ____________ compromise, also known as the ____________ hack
Perhaps the most striking example of the limitations of monitoring tools was shown in the SolarWinds compromise, also known as the SUNBURST hack
Data loss prevention (DLP) tools can serve many functions including the following except:
A. Compliance
B. Security
C. Asset management
D. Intrusion detection
The correct answer is D.
Intrusion detection is not one of the functions. DLP tools can serve many functions, but it depends on how they are deployed and what settings the organization applies.
ITIL
Information Technology Infrastructure Library
One of the more widely adopted information technology change practices is defined in the Information Technology Infrastructure Library (ITIL) version 4, under the name of …
Change Enablement.
The ITIL process distinguishes changes among three levels based on their urgency
Standard changes, which are relatively low-risk and follow established procedures,
Emergency changes are those which must be implemented immediately, and
Normal changes, which do not fall into either of the other two levels.
Once the organization has identified its Configuration Items, the minimum set of security controls associated with that item are identified. This is the …
baseline (or, less ambiguously, the security baseline) for that particular CI.
During the initiation phase, Requests for Change (RFC) typically address all of the following except:
A. Identification of change requirements
B. Risk assessment
C. Documentation of the RFC
D. Evaluating the RFC for completeness
The correct answer is D.
Evaluating the RFC for completeness is part of the change review and approval process.
What is the difference between an incident and an event
Events occur when a change in a systems state occurs. The event becomes an incident when there’s a possibility of harm.
NIST Special Publication 800-61, Computer Security Incident Handling Guide, structures incident response activities in a four-phase lifecycle:
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity
ISO/IEC 27035 phases of incident management consist of
Planning and preparation
Detection and reporting
Assessment and decision
Response
Lessons learned
NIST SP 800-61 phases of incident management consist of:
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity
Under the Gramm-Leach-Bliley Act (GLBA), how long do organizations have to report cyber related compromises of a customer’s personally identifiable information (PII)?
36 hours
What ISO/IEC standard defines security incident management in five phases?
27035
List four standards that identify incident response as an essential control.
PCI DSS (Payment Card Industry Data Security Standard)
COBIT (Control Objectives for Information and Related Technologies)
SOC 2 (Trust Services Criteria) and the EU Network Information Security Directive 2016/1148
What are the four primary steps necessary for a cyber-forensic investigation?
Collection
Examination
Analysis
Reporting
What are the processes of SOAR?
A. Security orchestration, security automation, security response
B. Security, orchestration, automation, response
C. Security, orchestration, automation, recovery
D. Security, orchestration, authorization, response
A Security orchestration, security automation, security response
What are honeypots
machines that exist on the network but do not contain sensitive or valuable data
Typically, honeypots are placed in the network …
demilitarized zone (DMZ)