Security Operations - Quiz Revision Flashcards
Which of the following data sources would provide you with information about potential weaknesses and security flaws within a network or system?
A) IDS/IPS logs
B) Automated reports
C) Vulnerability scans
D) Network logs
Vulnerability scans provide information about potential weaknesses and security flaws within a network or system. Vulnerability scans involve automated assessments of network devices, servers, and applications to identify potential weaknesses and security vulnerabilities. These scans analyze system configurations, software versions, and patch levels to detect known vulnerabilities and misconfigurations that could be exploited by attackers. Reports generated from/by these vulnerability scans provide detailed information about identified vulnerabilities, including severity ratings, affected systems, and recommended remediation steps. By conducting vulnerability scans regularly, organizations can proactively identify and address security risks, thereby enhancing the overall security posture of their network and systems.
What are Automated reports?
Automated reports may include various types of information generated by security tools and systems, such as IDS/IPS alerts, network activity summaries, and system status reports. While automated reports can provide valuable insights into security events and operational metrics, they do not specifically focus on identifying potential vulnerabilities or weaknesses within the network or system. Automated reports may complement other data sources in a cybersecurity investigation but are not primarily used for assessing security vulnerabilities.
IPS/IDS logs?
Intrusion Prevention System (IPS) and Intrusion Detection System (IDS) logs record alerts and events related to security threats detected within the network. These logs contain information about suspicious network traffic, attempted intrusions, and malicious activities identified by the IPS/IDS sensors. While they can help identify suspicious network activity, they do not find unexploited weaknesses or vulnerabilities, such as unpatched software, open unnecessary ports, or affected systems. They identify and record information about issues as they are discovered. They record what is “happening now”, as opposed to alerting that you may have a potential problem in the future.
What does network logs capture?
Network logs capture information about network traffic, including source and destination IP addresses, port numbers, protocols, and packet details. These logs are generated by network devices such as routers, switches, and firewalls, and they provide insights into network activity and communication patterns. Like IPS and IDS logs, they do not analyze endpoints or the overall security posture of the network.
Management at your company has requested that you implement DLP. What is the purpose of this technology?
A) It monitors data on computers to ensure the data is not deleted or removed.
B) It protects against malware.
C) It allows organizations to use the Internet to host services and data remotely instead of locally.
D) It implements hardware-based encryption.
Data Loss Prevention (DLP) is a network system that monitors data on computers to ensure the data is not deleted or removed. If your organization implements a DLP system, you can prevent users from transmitting confidential data to individuals outside the company.
What is cloud computing?
Cloud computing is a technology that allows organizations to use the Internet to host services and data remotely instead of locally.
What is TPM?
Trusted Platform Module (TPM) and Hardware Security Module (HSM) are both chips that implement hardware-based encryption. The main difference between the two is that a TPM chip is usually mounted on the motherboard and HSM chips are PCI adapter cards.
What are the different solutions are provided with DLP?
DLP provides different solutions based on data location:
Network-based – deals with data in motion and is usually located on the network perimeter.
Storage-based – operates on long-term storage (archive)
Endpoint-based – operates on a local device and focuses on data-in-use.
Cloud-based – operates in “the cloud” data in use, motion, and at rest
What services does DLP provide?
DLP identifies and controls end-point ports as well as block access to removable media by providing the following services:
Identify removable devices connected to your network by type (USB thumb drive, DVD burner, mobile device), manufacturer, model number, and MAC address.
Control and manage removable devices through endpoint ports, including USB, Wi-Fi, and Bluetooth.
Require encryption, limit file types, and limit file size.
Provide detailed forensics on device usage and data transfer by person, time, file type, and amount.
DLP includes USB blocking, cloud-based, and email services.
Management has decided to install a network-based intrusion detection system (NIDS). What is the primary advantage of using this device?
A) It is low maintenance.
B) It launches no counterattack on the intruder.
C) It has a high throughput of the individual workstations on the network.
D) It has the ability to analyze encrypted information.
The primary advantage of an NIDS is the low maintenance involved in analyzing traffic in the network. An NIDS is easy and economical to manage because the Signatures are not configured on all the hosts in a network segment. Configuration usually occurs at a single system, rather than on multiple systems. By contrast, host-based intrusion detection systems (HIDSs) are difficult to configure and monitor because the intrusion detection agent should be installed on each individual workstation of a given network segment. HIDSs are configured to use the operating system audit logs and system logs, while NIDSs actually examine the network packets.
Does the packet that goes through the VPN be readable with NIDS?
Individual hosts do not need real-time monitoring because intrusion is monitored on the network segment on which the NIDS is placed, and not on individual workstations. An NIDS is not capable of analyzing encrypted information. For example, the packets that travel through a Virtual Private Network tunnel (VPN) cannot be analyzed by the NIDS. The lack of this capability is a primary disadvantage of an NIDS.
Does NIDS effect the throughput of a workstation?
The high throughput of the workstations in a network does not depend on the NIDS installed in the network. Factors such as the processor speed, memory, and bandwidth allocated affect the throughput of workstations.
Does Network Switches affect Switched Network if NIDS is used?
The performance of an NIDS can be affected in a switched network environment because the NIDS will not be able to properly analyze all the traffic that occurs on the network on which it does not reside. An HIDS is not adversely affected by a switched network because it is primarily concerned with monitoring traffic on individual computers.
You need to restrict access to resources on your company’s Windows Active Directory domain. Which criteria can be used to restrict access to resources?
A)location
B)all of these choices
C)transaction type
D)time of day
E)roles
F)groups
Roles, groups, location, time of day, and transaction type can all be used to restrict access to resources. Regardless of the criteria used, access administration can be simplified by grouping objects and subjects. Access control lists (ACLs) can be used to assign users, groups, or roles access to a particular resource. If you implement time of day restrictions with ACLs, security is improved.
Examine the following exhibit. Based on the output, what is displayed?
A) A firewall log
B) A packet capture
C) Metadata
D) An endpoint log
The exhibit is a Windows Firewall log. Firewall logs record every attempt to access the network. They record information such as source and destination IP addresses, ports, protocols, and connection status. Analyzing firewall logs can help security analysts identify unauthorized access attempts, suspicious network behavior, and potential threats such as port scanning or denial-of-service (DoS) attacks. Firewall logs are valuable for monitoring and enforcing network security policies and detecting anomalous activities at the network perimeter.
Firewall logs are a type of network log. Network logs capture information about network traffic, including source and destination IP addresses, port numbers, protocols, and packet details. These logs are generated by network devices such as routers, switches, and firewalls, and they provide insights into network activity and communication patterns. The following exhibit shows output from the netstat command:
What is an example of an endpoint log?
Endpoint logs record events and activities generated by endpoints such as desktops, laptops, and mobile devices. These logs contain information about user logins, file access, system processes, and network connections initiated by endpoint devices. Analyzing endpoint logs can help detect security threats such as malware infections, insider attacks, and unauthorized access attempts. Endpoint logs are crucial for monitoring endpoint security, investigating security incidents, and identifying potential security risks or vulnerabilities within the organization’s endpoint infrastructure.
Eventviewer
What is packet capture?
Packet captures, also known as packet sniffing or network traffic analysis, capture and record data about individual network packets exchanged between devices on a network. Packet captures provide a more detailed record of network traffic than does a network log, including source and destination IP addresses, port numbers, protocols, packet payloads, and communication patterns. By analyzing packet captures, cybersecurity investigators can identify potential security threats, such as malicious activities, network intrusions, and data exfiltration attempts. The following example shows a packet capture made using Wireshark, with a detail pane expanding on packets captured from source IP address 10.2.2.101
What is metadata?
Metadata refers to descriptive information about data, such as the time stamps, file sizes, sender/recipient details, and other attributes associated with files or communication sessions. As an example, metadata associated with an email communication may include the sender’s email address, recipient’s email address, subject line, time and date of transmission, and file attachments. Analyzing this metadata can help investigators trace the source of suspicious emails, identify potential data exfiltration attempts, and reconstruct the timeline of cyber incidents. Metadata is valuable for understanding the characteristics and context of data exchanges, enabling investigators to gain a deeper understanding of security events and formulate effective response strategies.
You need to remove data from a storage media that is used to store confidential information. Which method is NOT recommended?
A) zeroization
B) degaussing
C) destruction
D) formatting
Formatting is not a recommended method. Formatting or deleting the data from a storage media, such as a hard drive, does not ensure the actual removal of the data, but instead removes the pointers to the location where the data resides on the storage media. The residual data on the storage media is referred to as data remanence. The main issue with media reuse is remanence. The residual data can be recovered by using data recovery procedures. This can pose a serious security threat if the erased information is confidential in nature. Sanitization is the process of wiping the storage media to ensure that its data cannot be recovered or reused. Sanitization includes several methods, such as zeroization, degaussing, and media destruction. All of these methods can be used to remove data from storage media, depending on the type of media used. Most storage media with a magnetic base can be sanitized. However, CDs and DVDs often cannot be degaussed. If this is the case, the only option is physical destruction of the CD or DVD.
How can you implement proper controls when ensuring data security?
When implementing appropriate controls to ensure data security, you need to design the appropriate data policies, including the following:
Data wiping – ensures that the contents of the media are no longer accessible.
Data disposing – destroys the media to ensure that media is unusable.
Data retention – ensures that data is retained for a certain period. The data retention policies should also define the different data types and data labeling techniques to be used.
Data storage – ensures that data is stored in appropriate locations. In most cases, two copies of data should be retained and placed in different geographic locations.
No matter which type of media you must dispose of or reuse, you need to ensure that your organization understands the legal and compliance issues that will affect the disposal. Certain types of protected data, such as personally identifiable information (PII) or personal health information (PHI), may require special handling when stored on media.
You want to configure password policies that ensure password strength. Which password setting most affects a password’s strength?
A) password history
B) password age
C) password complexity
D) password lockout
Password complexity is the most important setting to ensure password strength. Password complexity allows you to configure which characters should be required in a password to reduce the possibility of dictionary or brute force attacks. A typical password complexity policy would force the user to incorporate numbers, letters, and special characters. Both uppercase and lowercase letters can be required. A password that uses a good mix, such as Ba1e$23q, is more secure than a password that only implements parts of these requirements, such as My32birthday, NewYears06, and John$59. Note that password complexity rules are less effective when users make common character substitutions in dictionary words, such as zero for O, @ for a, and 3 for E.
A large financial institution needs to securely manage and grant temporary access to privileged accounts for third-party contractors performing system maintenance. Of the choices given, which solution would be most appropriate for privileged access management?
A) Just-in-time permissions
B) Password vaulting
C) Time-limited authorization
D) Ephemeral credentials
Ephemeral credentials would be the most appropriate solution for privileged access management. Ephemeral credentials refer to temporary, short-lived credentials generated dynamically for accessing privileged accounts or resources. Ephemeral credentials can be generated on-demand and automatically revoked after a predefined period, reducing the risk of credential theft, misuse, or exposure. This ensures that third-party contractors have access only for the duration required to perform system maintenance tasks, enhancing security and compliance.
What is the temporary solution for Just-in-time permissions?
Just-in-time permissions involve granting temporary access to resources or privileged accounts for a specific period, typically based on user requests or predefined policies. While just-in-time permissions provide a means to limit exposure and reduce the risk of unauthorized access, they may not be the most appropriate solution for the scenario described. Just-in-time permissions are typically used for user accounts within an organization’s internal network, rather than third-party contractors requiring temporary privileged access for system maintenance.
What is password Vaulting?
Password vaulting involves securely storing and managing passwords, encryption keys, and other sensitive credentials used to access privileged accounts. While password vaulting helps centralize and secure access to privileged accounts, it may not be the most appropriate solution for the scenario described. Password vaulting solutions are designed to manage static credentials and do not provide temporary access or time-limited authorization capabilities required for third-party contractors performing system maintenance.