Application Monitoring Flashcards
(35 cards)
The process of tracking application performance, behavior, and security events in real time.
Application monitoring
Logs that track web requests, errors, and session details in web applications.
Web server logs
A type of log that records database queries, user access, and modification events.
Database logs
A system used to visualize, search, and analyze logs from applications and services.
Log management system (e.g., ELK Stack)
Monitoring method that observes an application’s health from the outside by simulating user behavior.
Synthetic monitoring
Monitoring technique that inspects how the code performs internally and logs errors or exceptions.
Real user monitoring (RUM)
A tool used to detect anomalies in application log data using machine learning or heuristics.
Application Performance Monitoring (APM) platform
A security issue where an attacker injects malicious code into user input fields.
Code injection
A critical log message that indicates something is failing and needs immediate attention.
Application error log
The set of events and transactions that help understand how an app was accessed or abused.
Application activity trail
This type of log records user login attempts and session activity within an application.
Authentication log
Unauthorized application behavior, like accessing files outside its intended directory.
Path traversal attack
A common file used by web apps to record user interactions and errors.
Access.log or error.log
A log entry showing repeated failed logins to an application could indicate:
Brute-force attempt
Unusual spikes in resource usage (CPU, memory) from an app could mean:
Denial-of-Service (DoS) attack or resource abuse
A spike in failed HTTP requests (e.g., 403 or 404) might signal what?
Reconnaissance or scanning
A type of attack detected when a user uploads an unexpected file type to an application.
File upload vulnerability
A metric that measures how often an application is not available or responding.
Downtime
Monitoring feature that alerts when changes are made to configuration files.
File integrity monitoring
Metric that tracks how long an app takes to complete requests.
Response time
An alert generated when a user accesses privileged features without authorization.
Privilege escalation alert
A secure method to monitor apps that involves encrypting logs and alerts.
Secure log transport (e.g., TLS)
A log entry showing SQL commands sent through a URL parameter might indicate:
SQL injection
A suspicious application event where a user logs in from multiple locations simultaneously.
Session hijacking indicator