Module 20 - Network Security data Flashcards
(130 cards)
Which type of data is generated by IDS or IPS systems when traffic violates a rule or matches a known exploit signature?
Alert data
Which type of data records a conversation between two network endpoints, including five-tuple info, byte counts, and duration?
Session data
Which tool, formerly known as Bro, captures and analyzes session and transaction data for network security monitoring?
Zeek
Which intrusion detection system generates alert messages that can be searched and viewed using tools like Sguil and Squert?
Snort
Which network-based IDS (NIDS) tool uses rules to detect known exploits and generate alerts in a network environment?
Snort
Which tools within the Security Onion suite are used to view and analyze alert messages from Snort?
Sguil and squert
Which website can be used to harmlessly test whether Snort is functioning correctly by triggering a known alert?
testmyids.com
What type of data consists of the actual messages exchanged during a network session, such as requests and responses?
Transaction data
What type of log on a web server can store the request and reply transactions during a session?
An Access log
Which type of network data includes both metadata and the full contents of network conversations, such as email text or web HTML?
Full packet captures
Which tool is commonly used to view and analyze full packet captures, including raw data from sessions?
Wireshark
Why are full packet captures considered storage-intensive in network security monitoring?
They contain complete data for all traffic
Which Cisco tool, like Wireshark, can display full packet captures in its Network Analysis Monitor interface?
Cisco Prime Infrastructure
What type of network data is created through analysis and summarization of session or flow data to detect anomalies?
Statistical data
Which techniques compare current traffic to historical norms to identify statistically significant anomalies?
NBA (Network behavior analysis) and NBAD (Network behavior analysis anomaly ddetection)
Which IETF (Internet engineering taskforce) standard protocol is based on Cisco NetFlow version 9 for exporting flow-based statistical data?
IPFIX (Internet protocol flow information export)
What Cisco cloud-based NSM (Network security Management) tool uses machine learning and statistical models to detect threats inside an organization’s environment?
Cisco Cognitive Threat Analysis)
Which type of analysis uses user/device behavior and web traffic to detect command-and-control communication or data exfiltration?
Statistical Analysis
In session data, what does the field ts represent?
The session start timestamp
In session data, what does the field uid indicate?
The unique session ID
In session data, what does the field id.orig_h refer to?
The IP address of the originating host (host that originated the session), (source address)
In session data, what is represented by the field id.orig_p?
The port used by the originating host (source port)
In session data, what is described by the field id.resp_h?
The IP address of the host responding to the originating host (destination address)
In session data, what does the field id.resp_p show?
The port used by the host responding to the originating host (destination port)