Module 20 - Network Security data Flashcards

(130 cards)

1
Q

Which type of data is generated by IDS or IPS systems when traffic violates a rule or matches a known exploit signature?

A

Alert data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of data records a conversation between two network endpoints, including five-tuple info, byte counts, and duration?

A

Session data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which tool, formerly known as Bro, captures and analyzes session and transaction data for network security monitoring?

A

Zeek

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which intrusion detection system generates alert messages that can be searched and viewed using tools like Sguil and Squert?

A

Snort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which network-based IDS (NIDS) tool uses rules to detect known exploits and generate alerts in a network environment?

A

Snort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which tools within the Security Onion suite are used to view and analyze alert messages from Snort?

A

Sguil and squert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which website can be used to harmlessly test whether Snort is functioning correctly by triggering a known alert?

A

testmyids.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of data consists of the actual messages exchanged during a network session, such as requests and responses?

A

Transaction data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of log on a web server can store the request and reply transactions during a session?

A

An Access log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of network data includes both metadata and the full contents of network conversations, such as email text or web HTML?

A

Full packet captures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which tool is commonly used to view and analyze full packet captures, including raw data from sessions?

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are full packet captures considered storage-intensive in network security monitoring?

A

They contain complete data for all traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Cisco tool, like Wireshark, can display full packet captures in its Network Analysis Monitor interface?

A

Cisco Prime Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of network data is created through analysis and summarization of session or flow data to detect anomalies?

A

Statistical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which techniques compare current traffic to historical norms to identify statistically significant anomalies?

A

NBA (Network behavior analysis) and NBAD (Network behavior analysis anomaly ddetection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which IETF (Internet engineering taskforce) standard protocol is based on Cisco NetFlow version 9 for exporting flow-based statistical data?

A

IPFIX (Internet protocol flow information export)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What Cisco cloud-based NSM (Network security Management) tool uses machine learning and statistical models to detect threats inside an organization’s environment?

A

Cisco Cognitive Threat Analysis)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of analysis uses user/device behavior and web traffic to detect command-and-control communication or data exfiltration?

A

Statistical Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In session data, what does the field ts represent?

A

The session start timestamp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In session data, what does the field uid indicate?

A

The unique session ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In session data, what does the field id.orig_h refer to?

A

The IP address of the originating host (host that originated the session), (source address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In session data, what is represented by the field id.orig_p?

A

The port used by the originating host (source port)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In session data, what is described by the field id.resp_h?

A

The IP address of the host responding to the originating host (destination address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In session data, what does the field id.resp_p show?

A

The port used by the host responding to the originating host (destination port)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
In session data, what is indicated by the field proto?
The transport layer protocol being used in the session
22
In session data, what does the field service specify?
The application layer protocol involved in the session
23
In session data, what does the field duration measure?
The total length of the session
24
In session data, what does orig_bytes account for?
The number of bytes sent from the originating host
25
In session data, what does resp_bytes represent?
The number of bytes sent from the responding host
26
In session data, what does orig_packets refer to?
The number of packets sent by the originating host
26
In session data, what does resp_packets indicate?
The number of packets sent by the responding host
27
What type of network monitoring data includes files that are attached to emails or that were downloaded from the internet?
Extracted data
28
Which system runs on individual machines to detect and sometimes prevent intrusions using software like firewalls?
HIDS (Host based intrusion detection systems)
29
Which solution allows HIDS to submit logs to centralized servers for easier enterprise-wide search and analysis?
Centralized log management servers
30
Which open-source HIDS includes robust log collection and analysis functionality and is scalable for enterprises?
OSSEC
31
Which host-based security product for Linux offers similar features to OSSEC, including log analysis and collection?
Tripwire
32
Which tool in Microsoft Windows displays various local host logs for monitoring and investigation?
Event viewer
33
Which Event Viewer log type records events from different applications running on the system?
Application logs
34
Which Event Viewer log type contains information about hardware, drivers, and processes?
System logs
35
Which Event Viewer log type provides records related to software installations and Windows updates?
Setup logs
36
Which Event Viewer log type records events like logon attempts or file access for security monitoring?
Security logs
37
Which log type is essential for monitoring CLI activity, especially for attackers or malware using the command-line?
CLI logs
38
Which event type represents a major problem like data loss or a service failing to load during startup?
Error
39
Which event type may not be significant now but signals potential issues like low disk space?
Warning
39
Which event type confirms successful operations such as a driver or service starting normally?
Information
40
Which event type indicates a successful attempt to access a secured system resource?
Success audit
41
Which event type is logged when a user fails to access a secured resource like a network drive?
Failure audit
41
Which Windows component is responsible for logging security-related events and enforcing security policies?
LSASS (Local security authority subsystem service)
42
Which process name represents the Windows security subsystem responsible for logon processes and should run from System32?
lsass.exe
43
Which standard includes specifications for message formats, a client-server structure, and a network protocol used for event logging?
Syslog
43
Which Syslog Severity level refers to notable events that are not errors?
(5) Notice
43
What does it likely indicate if a file like 1sass.exe is running or if lsass.exe is found outside System32?
Presence of malware imitating lsass.exe
43
Which protocol allows many network devices to log events to centralized servers using a standard format?
Syslog
43
What are the common names for the Syslog receiver component? (2)
Syslog daemon (syslogd) or Syslog server
43
Which transport protocol and port does Syslog most commonly use for message transmission?
UDP port 514
43
What port is typically used when Syslog messages are sent over TCP?
TCP port 5000
43
How is Syslog message data typically transmitted over the network?
In Plaintext
43
What two values make up the PRI (priority) field of a Syslog message?
Facility and Severity
43
What range of integer values is used to represent Syslog Severity levels?
0 to 7
44
Which three components make up the structure of a full Syslog message?
PRI (priority), Header, MSG (Message)
44
Which Syslog Severity level represents a system that is unusable?
(0) Emergency
44
Which Syslog Severity level indicates that action must be taken immediately?
(1) Alert
44
Which Syslog Severity level signals a condition that should be corrected immediately and indicates failure in the system?
(2) Critical
44
Which Syslog Severity level represents a failure that is not urgent but should be resolved soon?
(3) Error
44
Which Syslog Severity level means no current error exists but one will occur if ignored?
(4) Warning
44
Where is the Priority value located within a Syslog packet?
At the start of the packet in-between angled brackets
44
Which Syslog Severity level is used for messages about normal operation?
(6) Informational
44
Which formula is used to calculate the Syslog Priority value?
Priority = (Facility x 8) + Severity
44
Which Syslog Severity level includes messages mainly useful for developers during debugging?
(7) Debug
44
Which part of a Syslog message contains the actual event description and is considered the most useful for analysts?
MSG (Message)
45
Which SIEM function links events from different systems to detect and react to threats more quickly?
Correlation
45
Which logs are created by network application servers like email or web servers and are essential for network security monitoring?
Server logs
45
Which field in a Syslog message identifies the broad category of the source, such as system, process, or application?
Facility field
45
Which SIEM feature displays real-time and historical event summaries through dashboards and visualizations?
Reporting
45
Which SIEM function collects event records from various sources for forensic and compliance purposes?
Log collection
45
Which server logs capture all DNS queries and responses, helping detect dangerous websites and data exfiltration?
DNS proxy server logs
45
Which two server log formats should you be familiar with for web server access monitoring?
Apache web server access logs and Microsoft IIS (internet information services) server logs
45
Which logging system is commonly used by UNIX and Linux servers?
Syslog
45
Which type of logs help analysts detect DNS-based malware communications and C2 server access?
DNS proxy logs
45
Which SIEM function maps different log formats into a unified model to enable cross-system analysis?
Normalization
45
What technology is used to provide real-time reporting and long-term analysis of security events across a network?
SIEM (Security Information and Event Management)
45
Which SIEM feature ensures organizations can meet the reporting demands of regulatory frameworks?
Compliance
45
Which open-source SIEM platform combines Elasticsearch, Logstash, and Kibana?
Security Onion with ELK
45
Which SIEM feature reduces the total volume of log data by consolidating duplicates?
Aggregation
45
Which SIEM solution includes several open-source tools and is known for its integration with ELK?
Security Onion
46
Which popular SIEM tool, developed by a Cisco partner, is widely used in Security Operations Centers (SOCs)?
Splunk
46
Which technology builds upon SIEM by automating security response workflows and facilitating incident response?
SOAR (Security Orchestration Automation and Response)
46
Which Cisco platform aims to unify multiple tools into a single, integrated security solution?
Cisco SecureX
46
What limitation do most standalone security tools face, prompting the need for integrated platforms?
Lack of compatibility
46
Which command-line tool captures and displays packets in real time or saves them to a file?
Tcpdump
46
What is the IETF standard based on Cisco NetFlow Version 9?
IPFIX (IP Flow information Export)
46
Which GUI-based tool is built on the functionality of tcpdump?
Wireshark
46
Which protocol, developed by Cisco, is used for session-based accounting and network troubleshooting?
Netflow
46
Does NetFlow perform full packet captures?
No
46
Which open-source tool adds a GUI to NetFlow data viewing?
FlowViewer
47
What structure stores all flow information in NetFlow?
Netflow cache
47
What device is responsible for creating and transmitting NetFlow flow records?
A Netflow Exporter
47
Where are NetFlow flow records sent for storage and analysis?
A Netflow collector
48
Which concept refers to a set of packets with matching attributes moving in one direction until a TCP session ends?
A flow (in Netflow terminology)
48
Which application recognition engine used by AVC identifies Layer 3 to Layer 7 data and supports 1000+ applications?
Next generation NBAR (Network based application recognition version 2)
48
Which Cisco system combines application recognition, metrics collection, reporting, and control functions to monitor and manage over 1000 applications?
Cisco AVC (Application visibility and Control)
48
48
Which Cisco appliance offers over 30 logs for monitoring email delivery, antivirus, antispam, and system health?
Cisco ESA (Email Security Appliance)
48
48
Which syslog facility code is used by default for Cisco ASA devices, and what standard value does it correspond to?
Facility 20, corresponding to local4
48
48
Which Cisco device acts as a web proxy and logs all inbound and outbound HTTP traffic in customizable formats?
Cisco WSA (Web Security Appliance)
48
Which part of a Cisco syslog message may include a Cisco-assigned facility value and device-specific details?
The MSG (Message) part
48
Which part of a Cisco syslog message includes the syslog-standard facility used in PRI calculations?
The PRI (priority) part of syslog messages
49
49
49
49
49
49
49
49
49
49
49
49
49
49
49
49
49
49
49
49
50