Application Monitoring Flashcards

(35 cards)

1
Q

The process of tracking application performance, behavior, and security events in real time.

A

Application monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Logs that track web requests, errors, and session details in web applications.

A

Web server logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of log that records database queries, user access, and modification events.

A

Database logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system used to visualize, search, and analyze logs from applications and services.

A

Log management system (e.g., ELK Stack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Monitoring method that observes an application’s health from the outside by simulating user behavior.

A

Synthetic monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Monitoring technique that inspects how the code performs internally and logs errors or exceptions.

A

Real user monitoring (RUM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A tool used to detect anomalies in application log data using machine learning or heuristics.

A

Application Performance Monitoring (APM) platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security issue where an attacker injects malicious code into user input fields.

A

Code injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A critical log message that indicates something is failing and needs immediate attention.

A

Application error log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The set of events and transactions that help understand how an app was accessed or abused.

A

Application activity trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This type of log records user login attempts and session activity within an application.

A

Authentication log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorized application behavior, like accessing files outside its intended directory.

A

Path traversal attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A common file used by web apps to record user interactions and errors.

A

Access.log or error.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A log entry showing repeated failed logins to an application could indicate:

A

Brute-force attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unusual spikes in resource usage (CPU, memory) from an app could mean:

A

Denial-of-Service (DoS) attack or resource abuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A spike in failed HTTP requests (e.g., 403 or 404) might signal what?

A

Reconnaissance or scanning

14
Q

A type of attack detected when a user uploads an unexpected file type to an application.

A

File upload vulnerability

14
Q

A metric that measures how often an application is not available or responding.

14
Q

Monitoring feature that alerts when changes are made to configuration files.

A

File integrity monitoring

14
Q

Metric that tracks how long an app takes to complete requests.

A

Response time

14
Q

An alert generated when a user accesses privileged features without authorization.

A

Privilege escalation alert

14
Q

A secure method to monitor apps that involves encrypting logs and alerts.

A

Secure log transport (e.g., TLS)

14
Q

A log entry showing SQL commands sent through a URL parameter might indicate:

A

SQL injection

14
Q

A suspicious application event where a user logs in from multiple locations simultaneously.

A

Session hijacking indicator

15
A specific user-generated event, such as uploading a file or clicking a button.
Application event
15
Tool that can visualize metrics like request counts, error rates, and latency.
Prometheus + Grafana
15
A monitoring method that compares baseline behavior with live activity to detect anomalies.
Behavioral analysis
15
Security-focused monitoring that detects unexpected outbound calls from an application.
Egress monitoring
16
A practice where applications continuously generate telemetry data for monitoring.
Instrumentation
16
A metric that tells how many users successfully completed a workflow in the app.
Conversion rate
16
Best practice for reducing log noise by filtering non-critical events.
Log normalization
17
When monitoring shows unauthorized access to application APIs, it could indicate:
API abuse or token theft
18
A type of testing that evaluates app behavior under heavy traffic.
Load testing
19
The process of categorizing logs by severity, source, or event type for better analysis.
Log categorization
20
Monitoring used to track failed login attempts, 2FA bypasses, or role changes.
Identity and access monitoring