Security Assessment Techniques Flashcards

1
Q

Threat hunting

A

Looking for threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

False positives

A

Things that are not issues brought up as a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocol analyzer

A

Analyze network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network scanner

A

NMAP angry IP Scanner

Rogue system detection, discover open systems ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless scanners

A

inSSIDer meta Kimset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password cracker

A

Used to find week passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability scanner

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Compliance scanner

A

Scans critical systems to ensure they meet security compliance standards set by the organization (Nessus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Banner grabbing

A

Os fingerprinting. A method to determine the OS running on a remote system

NMAP
Ncat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Siem

A

Security information and event management.

IT industry monitoring standard use to detect anomalies
Provides security related events in real time
Helps identify trend and patterns over time
Collects data into a central repository
Target for attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SIEM continued

A

Rule base for specific environments.

Statistical correction engine

Event deduplication reduces the clutter that duplicate log entries for the same event can create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Post scan actions

A

After completing a vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly