Practice Test 1 Flashcards
(75 cards)
According to the Microsoft Kubernetes Attack Matrix, which technique corresponds to the persistance tactic?
BITS Jobs
Cluster-admin binding
DLL Side-Loading
Writable hostpath mount
Writable hostpath mount
Which Azure Kubernetes Service activity is recorded in the Activity log by default?
Pod assigmnet
Cluster Creation
Autoscaling events
API server
The first place one would be inclined to peruse when analyzing Kubernetes activity in the AKS service may be the Activity Log. This data only contains information regarding the management place activity of the AKS service itself, in other words, when a cluster is created, modified, or deleted-not the underlying Kubemetes components’ activity.
Diagnostic settings can be enabled to provide a more thorough view of the Kubernetes infrastructure. This includes:
* kube-apiserver: Data related to validation and configuration for the Kubernetes API objects (e.g., pods, services)
* kube-scheduler: Pod-to-node assignment activity
* cluster-autoscaler: Autoscaling activity
What command would reveal the metadata for objects stored in the reports container shown in the following image?
lovelynovemberstorage | storage browser
Blob containers
* reports
- Get-AzStorageContainer -Context Private I Where-Object reports -ne 0
- az storage blob details —container-name reports —account-name tasha
- Get-AzBlobContainer -Container “reports” I -Metadata
- az storage blob list —container-name reports —account-name lovelynovemberstorage
The command az storage blob list -container-name $CONTAINERNAME account-name $ACCOUNTNAME provides useful blob metadata.
The Azure Cognitive Search esearch.score metric provides what information?
The relevance of the provided search criteria
The accessibility of the targeted data sources
The percentage of the search completed so far
The number of records matching the search criteria
The @search.score metric is the output of a similarity ranking algorithm in Azure Cognitive Search. Simply put, this applies a relevancy score to the retrieved document to aid in ranking which retrieved result is more relevant to the search conducted. The higher the number, the more relevant. However, when searching for the existence of a string, the relevancy score of greater than 0 should be an indication that you have found a document with the search in question.
Which of the following describes the Azure NSG Flow log traffic shown below?
“1665426195,91.240.118.75,10.0.0.4,49931,51315,T,I,D,B,,,,”
UDP traffic
Beginning of flow
Allowed traffc
Outbound traffic
The flow tuple structure for Azure NSG Flow logs is:
Timestamp (UNIX Epoch)
* Source IP
* Destination IP
* Source Port
* Destination Port
* Protocol (TCP, UDP)
* Trafic Flow Onbound, Outbound)
* Trafic Decision (Allow, Deny)
NSG Flow Log Version 2 only
* **Flow State (Begin, Continue, End) **
* Packets (Source Destination)
* Bytes (Source Destination)
* Packets (Destination Source)
* Bytes (Destination Source)
What tool can improve logs by removing unnecessary fields and adding valuable details such as IP to hostname resolution?
Logstash
Event Hubs
EventBridge
ElastiCache
Logstash is able to perform log enrichment. Logs can be redirected at Logstash so it can enrich them by removing unnecessary data (lowering the data transit) and adding relevant information.
EventBridge is useful for coordinating other components. It would be possible to perform log enrichment using lambda functions if EventBridge is configured to call this action. However, EventBridge does not provide enrichment by itself.
Azure’s Event Hubs can also forward logs to other systems, but it is not a log enrichment tool. ElastiCache is an unrelated tool intended to improve the performance of web pages by facilitating in-memory cache.
What can be determined from the VPC flow log below?
2 56425 eni-3333aa2 10.2.3.3 10.2.4.2 001 4 336141856 1666133655 1666133660 ACCEPT OK
There was TCMPUX traffic from 10.2.4.2 to 10.23.3
There was ICMP traffic from 10.2.4.2 to 10.2.3.3
There was ICMP traffic from 10.2.3.3 to 10.2.4.2
There was TCMPUX traffic from 10.23.3 to 10.2.4.2
There was ICMP traffic from 10.2.3.3 to 10.2.4.2
Which service offers both Application-based and Network-based traffic distribution across a Cluster of servers?
Azure CDN
Azure Load Balancer
AWS CloudFront
AWS Elastic Load Balancing
AWS Elastic Load Balancing allows developers to create highly available workloads. Developers also have the flexibility to select between different types of load balancers:
- Application Load Balancer: This allows for content-based routing and traffic routing
- Network Load Balancer: Distributes TCP/UDP/TLS traffic amongst target groups
CDNs like Azure CDN and AWS CloudFront cache content across various regions or availability zones. Azure Load Balancer is a network-based service and does not provide application load balancing.
What is the maximum amount of time that a new log can capture traffic from the AWS management console before sending it to a S3 bucket?
10 minutes
5 hours
1 hour
5 minutes
When creating a flow log, a maximum aggregation interval can be set. This determines the amount of time a now is captured, and a log record created. The maximum amount of time is 10 minutes. The other options are not valid for this setting.
What is Dockers default logging driver?
json-file
logentries
local
syslog
json-file
IP addresses, domain names, and file hashes would fall under what detection category?
Discrete
Atomic
Incremental
Statistical
Behavioral
Atomic
How will the output of the following command be displayed to the user?
$ aws cloudtrail lookup-events - -lookup-attributes AttributeKey=EventName, AttributeValue=ListBuckets
JSON
Gzip
Base64
csv
XML
JSON
Which dashboard provides the following status information?
Compliance status
Rules
33 Noncompliant rule(s)
8Compliant rule(s)
Resources
29 Noncompliant resource(s)
2Compliant resource(s)
Microsoft Defender
AWS GuardDuty
AWS Config
Microsoft Sentinel
The main dashboard of the AWS Config page shows its bias as a compliance service. A “compliant rule” is a rule that specifies some configuration requirement for a service.
What does the ‘2’ at the beginning of the following AWS VPC flow log signify?
2 490123987333 eni-300-f966c 10.10.1.11 10.10.2.22 49152 3389 6 20 3072 1433807350 1433180982 ACCEPT OK
Version
Interface identifier
Protocol
Packet number
Version
What service can provide monitoring for poor network performance of a user interface using canaries?
CloudTrail
CloudWatch
VPC flow logs
Pacu
CloudWatch
What needs to be taken into account when sending VPC Flow logs to its destination?
Delivery to a S3 bucket is instantaneous
CloudWatch services take up to 5 minutes to publish logs
CloudWatch can ingest a maximum of 200 MB at a time
S3 bucket has a maximum log size of 100 MB
CloudWatch services take up to 5 minutes to publish logs
What automated response action typically requires a human operator to complete?
Instance Deletion
Log collection
Notification Action
Secret rotation
Instance Deletion
Which of the following is expected to incur additional costs when using a CDN service?
Restricting access to content with geolocation blocking
Allowing the use of both HTTP POST and GET request methods
Requesting on-demand cache updates for expired content
Caching more than one type of static content for client access
This static content is stored on the CDN node for a user-defined period. The disadvantage is that if the file is updated on the origin server, the CDN node will not request the new file until after the old one expires. There are ways around this: you can initiate an on-demand data expiration. However, this technique should be used sparingly as it does cost the customer each time clearing the CDN cache is invoked.
An analyst is investigating a UEBA trigger in Microsoft Sentinel. Which field would provide more information on why the activity was tagged as anomalous?
Activitylnsights
AlertEvidence
Threatlntelligencelndicator
ActivityType
The Activitylnsights field within the BehaviorAnalystics provides more context to the UEBA alert and more details on why the behavior was identified as anomalous. The ActivityType field provides the high-level view of the activity that occurred. Threatlntelligencelndicator table holds data relating to threat intelligence that the analysts have imported. AlertEvidence is an event type for Microsoft 365 Defender.
Which log file does a Debian-based Linux system use to capture SSH login attempts?
/var/log/syslog
/var/log/secure
/var/log/kern.log
Ivar/log/auth.log
/var/log/auth.log
Which Azure Storage Container access level will provide full read access to the container and its blobs?
Private
Container
Blob
Container
What is an AWS trail?
The metadata associated with an API call
A method for delivering log events to an S3 bucket
An archive service for managing log retention
The network traffic sent to and from a VPC
A method for delivering log events to an S3 bucket
A “trail” is an AWS resource in the CloudTrail service that describes what kinds of events to save, the bucket to save it to, and potentially other actions when an event is generated.
By default, CloudTrail is storing ninety days of management events.
An engineer wants to look at both the current and historical configuration for software running on a virtual machine. Which solution can provide this?
AWS Config integrated with System Manager
Cloud Control API
Truffle Hog integrated with a SIEM
Athena
AWS Config integrated with System Manager
Which command completes the docker instruction below used to capture system activity?
In -s <command></command> /var/log/syslog
/etc/rsyslog
stdout
stderr
/proc/l/fd/l
By default, system activity data is written to /var/log/syslog when captured using a syslog daemon. Since a docker container is only interested in stdout and stderr of the main process (process ID 1), collecting log data from any other binaries running inside the container must be sent to /proc/l/fd/l.
The docker instruction - In -s /proc/l/fd/l /var/log/syslog- creates a symbolic link so that any data intended to be written to the syslog log file will, instead, be written to /proc/l/fd/l (the stdout of process ID 1).