1.7 Summarize the techniques used in security assessments. Flashcards

1
Q

Non-intrusive scan

A

Gathers info but does not exploit the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

intrusive scan

A

You will try the vulnerability via a pen test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What searches for known web exploits, such as SQL injection and cross-site scripting (XSS).

A

web application scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

common vulnerability scoring system (CVSS)

A

a metric score between 0 to 10 based on the characteristics of the vulnerability, such as whether it can trigger remotely or if it requires user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

determines whether a computer meets a configuration baseline

A

Security content automation protocol (SCAP).
Perform configuration reviews to ensure the system is secure and ready for production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

techniques with security information, event management (SIEM), and threat analytics platforms. Analysts can develop queries and filters to correlate threat data from these systems.

A

intelligence fusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat feeds

A

notifications of current and new threats may initiate updates to security policies and even signatures, to ensure security administrators can monitor those threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Maneuver

A

In a defensive maneuver, an analyst can perform passive discovery techniques so that threat actors have no hint that the analyst has discovered an intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

normalizing data from different sources so that it is consistent and searchable

A

log aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

tool that allows for a centralized collection of events from multiple sources

A

Syslog collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security orchestration, automation, response (SOAR)

A

a solution to the volume of alerts overwhelming an analyst’s ability to respond. It analyzes an organization’s store of security intelligence and uses deep learning techniques to automate and provide data enrichment to improve incident response and threat hunting workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name examples of data inputsintoa SIEM that can help determine health and /or security of an individual client computer.

A

Windows 10 Host, Vulnerability scanner, DLP Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sentient Analysis

A

machine learning technique of log analysis to identity intent. This can be used, for example, to monitor social media for brand “incidents,” such as a customer complaining on Twitter about poor service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly