1.7 Flashcards

Summarize the techniques used in security assessments.

1
Q

Is the practice of proactively searching for cyber threats that are inside a network yet remain undetected.

A

Threat hunting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______________ involves integrating multiple sources of threat intelligence to produce actionable insights and enhance situational awareness for cybersecurity operations.

A

Intelligence fusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are streams of curated threat intelligence data

A

Threat feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are published sets of information from partners, such as security vendors, industry groups, the government, information-sharing groups, and other sources of information.

A

Advisories and bulletins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refers to the strategic movement or actions taken by attackers to exploit vulnerabilities, evade detection, or achieve their objectives within a target network or system.

A

Maneuver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Are automated assessments conducted to assess security vulnerabilities present in systems.

A

Vulnerability scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are instances where a security tool incorrectly identifies benign or legitimate activity as malicious or suspicious.

A

False positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Are instances where a security tool fails to detect genuine security threats or malicious activity, thereby allowing them to go undetected.

A

False negatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Involve analyzing log files generated by systems, applications, or network devices to identify security incidents, anomalies, or unauthorized activities.

A

Log reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accessing systems, devices, or applications using valid authentication credentials, to perform authorized actions or operations.

A

Credentialed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refers to accessing systems, devices, or applications without using valid authentication credentials.

A

non-credentialed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security assessments that involve actively probing, scanning, or interacting with systems, networks, or applications to identify vulnerabilities. May include penetration testing, vulnerability scanning, and other active reconnaissance techniques.

A

Intrusive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security assessments that involve passive observation, analysis, or monitoring of systems, networks, or applications without directly interacting with them. Aim to assess security posture without disrupting normal operations or risking system stability.

A

non-intrusive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is a standardized list of publicly known cybersecurity vulnerabilities identified by the MITRE Corporation. Each entry includes a unique identifier, description, and references to affected products or systems.

A

Common Vulnerabilities and
Exposures (CVE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is a scoring system used to assess the severity of vulnerabilities based on various factors such as exploitability, impact, and complexity.

A

Common
Vulnerability Scoring System (CVSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Involves evaluating the configuration settings of systems, devices, or applications to identify security weaknesses, misconfigurations, or deviations from best practices. Help ensure that systems are properly configured to minimize security risks and comply with security policies.

A

Configuration review

17
Q

Is a standard protocol used for sending and receiving log messages from network devices, servers, and applications.

A

Syslog

18
Q

Are applications that collect, aggregate, and analyze log data from various sources to provide real-time monitoring, threat detection, and incident response capabilities in cybersecurity operations.

A

Security information and
event management (SIEM)

19
Q

Also known as packet sniffing or network traffic analysis, involves capturing and analyzing network packets transmitted over a network.

A

Packet capture

20
Q

Is a cybersecurity technique that involves monitoring and analyzing user activities, behaviors, and patterns to detect anomalies, insider threats, and suspicious behavior indicative of security incidents.

A

User behavior analysis

21
Q

Is a cybersecurity technique that involves analyzing text data, such as social media posts, emails, or customer reviews, to determine the opinions, or attitudes expressed by individuals or groups.

A

Sentiment analysis

22
Q

Involves continuously monitoring and analyzing systems, networks, and data for signs of security threats, vulnerabilities, or unauthorized activities.

A

Security monitoring

23
Q

Is the process of combining logs together.

A

Log aggregation

24
Q

Are pieces of software that function to gather data from multiple independent sources and feed it into a unified source such as a SIEM.

A

Log collectors

25
Q

Are systems that take SIEM data as well as data from other sources and assist in the creation of runbooks and playbooks.

A

Security orchestration,
automation, and response (SOAR)