4.3 Incident, utilize appropriate data sources to support investigation Flashcards

1
Q

Vulnerability scan output: what a vuln scan can tell you ?

A
  • There is a lack of security controls: no firewall, no anti-virus, no anti-spyware
  • Misconfigurations: open shares, guest access
  • Real vunerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability scan output: how to prevent false positives / negatives ?

A

Ensure your scanner is updated with the latest signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SIEM dashboard: what is a SIEM ?

A

Logging of security events and information. You got security alerts real-time.
Also able to do data correlation and forensic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SIEM dashboard: where a SIEM gather information?

A
  • OS
  • Infrastructure devices
  • NetFlow sensors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SIEM dashboard: how a SIEM get information ?

A

Using sensors and logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Log files: what can you find in network log files ?

A

Data form switches, routers, access point, VPN concentrators. It can be:
- network changes: touting updates, authentication issues, network issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Log files: what can you find in system log files ?

A

OS informaton: extensive logs, files system information, authentication details, security events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Log files: what can you find in application log files ?

A

Log specific to the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Log files: where can you find application log files in Linux/ Windows ?

A

/var/log directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Log files: what can you find in security log files ?

A

Detailes security-related information: blocked and allowed traffic flows, exploit attempts, blocked URL categories, DNS sinkhole traffic,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Log files: what can you find in firewall log files ? And WAF?

A

Information on the traffic flows: deny website packet, blocked packet
WAF provide additional info on certains attacks (XSS, SQLi)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Log files: what can you find in web log files ?

A
  • Web server access: IP address, web page URL
  • Access errors: unauthorized folder/ file
  • Exploit attempts
  • Server activity: startup, shutdown, restart message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Log files: what can you find in DNS log files ?

A
  • Queries made to the DNS
  • IP address of the request
  • Identify queries to known bad URLs
  • Block or modify known bad request at the DNS server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Log files: what can you find in authentication log files ?

A
  • Know who logged in: account names, source IP address, authentication method
  • Identify multiple failures
  • Correlate with other events: file transfer, app installation etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Log management: what is syslog?

A

Protocol that computer systems use to send event data logs to a central location for storage (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Log management: what is journalctl?

A

Utility for querying and displaying logs from journald, systemd’s logging service in Linux

17
Q

Log management: what is metadata?

A

Data that describes other data sources

Ex: email header details, sending server, destination address, when taking photo the GPS location, type of phone are metadata

18
Q

Log management: what is Netflow?

A

Gather traffic statistics from traffic flows such as shared communication between routers, switches etc. There are probe and collector that watches network communication