Module 25 Network Security Data Flashcards

1
Q

What are some network security monitoring tools?

A

Snort, Sguil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an example of a network IDS?

A

Snort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is alert data?

A

Messages generated by intrusion prevention systems or intrusion detection systems in response to traffic that violates a rule or matches a signature of an exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are alerts generated?

A

Generated by Snort (NIDS), and made readable by Sguil and Squert applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is session data recorded?

A

Record of a conversation between two end points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Within this recorded data, what are the five tuples?

A

Source/Destination IP, Source/Destination port and the IP code for protocol in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are packet captures important?

A

Contains the actual content of conversations, text of email messages, the HTML in web pages and the files that enter or leave the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do we collect statistical data?

A

Cisco Cognitive Threat Analysis - finds malicious activity that has bypassed security controls by identifying traffic patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some types of host logs

A

HIDS - event viewer - application logs, system logs, setup logs, security logs and command-line logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a system log?

A

These include events regarding the operation of drivers, processes and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a setup log?

A

Installation of software, including windows updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a security log?

A

These record events related to security, logon attempts and operations related to file or object management and access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are application logs?

A

These contain events logged by various applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are command-line logs?

A

Attackers who have gained access, execute commands from the CLI rather than GUI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some type of host logs? Event types

A

Error, Warning, Information, Success Audit, Failure Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a warning log?

A

Not necessarily significant but may indicate a future problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an error log

A

Event that indicates a significant problem such as loss of data or functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an information log

A

Describes successful operation of an app, driver or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many distinct parts of a syslog message

A

3 - priority, header and msg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe the priority part of the syslog message

A

Two elements - Severity and Facility. Severity is a value (0-7), facility consists of sources that generated the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the Syslog severity values?

A

0 - 7 (Emergency, Alert, Critical, Error, Warning, Notice, Informational and Debug

22
Q

What is an emergency?

A

System is unusable

23
Q

What is alert

A

Action must be taken immediately

24
Q

What is critical?

A

critical conditions that should be corrected immediately and indicates failure in a system

25
What is error?
A failure that is not urgent
26
What is a warning?
An error that does not presently exist, but an error will occur in the future if IT IS NOT ADDRESSED
27
What is notice?
An event that is not an error, but it is unusual
28
What is informational
messages issued regarding normal operations
29
What is debug
Message of interest
30
How about server logs?
Server logs are an essential source of data for networking security monitoring.
31
What are two important file logs?
Apache webserver and Microsoft Internet Information Server (IIS)
32
All of these logs, server, network, etc - should be dumping into where? What type of central holding dump
SIEM - Security Information and Event Management. Provides real time reporting and long-term analysis of security events.
33
What are the main points SIEM hits on - providing a view of the enterprise network using the following functiosn
Log collection, normalization, correlation, aggregation, report and compliance
34
What is log collection
Events recorded from sources through the org
35
What is normalizaiton
This maps log messages from diff systems into a common data model enabling the org to connect and analyze related vents
36
What is correlation
Links logs from disparate systems or applicaitons
37
What is aggregation
This reduces the volume of event data by consolidating duplicate records
38
What is reporting
Presents the correlated, aggregated event data in real-time monitoring and long-time summaries.
39
What is a popular SIEM
Splunk
40
What is a popular packet analyzer?
Tcpdump
41
What does NetFlow do?
Provides an important set of services for IP applications, including network traffic accounting, usage-based network billing, network planning, security, DoS monitoring capabilities and network monitoring
42
What other things does netflow do
It provides information about network users, applications, peak usage times and traffic routing. Records info about packet flow including metadata
43
What is AVC?
Cisco Application Visibility and Control system combines multiple technologies to recognize, analyze and control over 1000 applications.
44
What would be a type of AVC or application recognition?
NBAR2 (L3-L7)
45
What would be a metrics collection tool - bandwidth, usage, latency, etc/
Netflow
46
How about, collecting data and reporting on application performance?
Cisco Prime
47
How about. what control application can we use to maximize network performance?
QoS
48
What is the diff between port monitoring and application monitoring/
Port looks at port number, applications look at applications DUH. Data and ports vs data and apps.
49
What is the difference between cisco facility, severity and Mnemonic when it comes to a log
Cisco Facility would be like ASA or SYS, severity is like 5 or 4 or 3, etc. Mnemonic is config - text changed in the configuration
50
What does Cisco Umbrella do?
Offers a hosted DNS service that extends the capability of DNS to include security enhancements
51