Network Monitoring Flashcards
(81 cards)
What does an Intrusion Detection System (IDS) do?
Detects network threats and is a passive device that monitors network traffic, logs, and alerts
An IDS does not take action to block threats but rather provides alerts.
What is the primary function of an Intrusion Prevention System (IPS)?
Detects network threats and responds to them as an active device operating in line, blocking offending traffic
An IPS takes immediate action to prevent detected threats.
What is Snort?
Software-based IDS/IPS that is open-source and widely used
Snort can be configured to detect various types of network attacks.
What are the challenges associated with IPS?
False positives can lead to blocking legitimate traffic
This can disrupt normal network operations.
Name the three detection methods used in intrusion detection systems.
- Signature-based
- Policy-based
- Anomaly-based
Each method has its own approach to identifying threats.
What is the difference between network-based and host-based IDS/IPS?
- Network-based – protects entire network
- Host-based – installed on individual hosts
A combination of both can provide more comprehensive protection.
What is Simple Network Management Protocol (SNMP)?
An Internet protocol for collecting, organizing, and modifying information about managed devices on IP networks
SNMP can also be used to change device behavior.
What are SNMP agents?
Network devices sending information to the SNMP manager
They play a crucial role in the SNMP architecture.
What are the message types in SNMP?
- Set
- Get
- Trap
Each type serves a different function in communication between the manager and agents.
What is the purpose of a Granular Trap in SNMP?
Each SNMP trap message is sent with a unique Object Identifier (OID)
This helps in identifying specific variables that can be monitored.
What does SNMPv3 provide that the previous versions do not?
Most secure with integrity, authentication, and confidentiality features
It uses hashing and encryption to enhance security.
What is the function of network sensors?
Allows different access privileges for enhanced network protection and management
They monitor device performance among other functions.
What does a temperature sensor report?
Device chassis temperature with minor and major thresholds indicating different levels of heat
Excessive heat can lead to performance issues or failures.
What is considered normal CPU usage/utilization?
5% to 40%
High utilization may indicate misconfiguration or other issues.
What are the consequences of network attacks?
- Packet drops
- Connection failure
These consequences can significantly disrupt network operations.
What is a packet capture?
Used to capture all data going to or from a network device
It helps in analyzing network traffic and identifying issues.
What is a SYN Flood attack?
Flood of SYN packets, without completing the three-way handshake, to overwhelm a server
This type of attack aims to exhaust server resources.
YOU WONT SEE THE PORT NUMBERS
What is flow analysis in network monitoring?
Recording of metadata and statistics about network traffic using flow collector tools
It does not capture the content of the traffic.
What is the purpose of NetFlow?
Cisco-developed means of reporting network flow information to a structured database
It helps in analyzing traffic patterns and behaviors.
What does Syslog do in network logging?
Transmits logs to a central server, simplifying the process of collecting logs from all devices
This is crucial for large networks to manage log data effectively.
What are the eight severity levels of Syslog?
- 0 – Emergency
- 1 – Alert
- 2 – Critical
- 3 – Error
- 4 – Warning
- 5 – Notice
- 6 – Information
- 7 – Debugging
Each level indicates the severity of the log message.
What is the purpose of Security Information and Event Management (SIEM)?
Provides real-time or near real-time analysis of security alerts generated by network hardware and applications
SIEM helps maintain a strong security posture.
What are the main functions of SIEM?
- Log Collection
- Normalization
- Correlation
- Aggregation
- Reporting
These functions enhance the ability to detect and respond to threats.
What is the role of log normalization in SIEM?
Map log messages from different systems into a common data model for analysis
This process makes it easier to analyze diverse log data.