Sound the Alarm: Detection and Response: Module 4 Flashcards

(25 cards)

1
Q

Anomaly-Based Analysis

A

A way to find strange or unusual behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Array

A

A list of items in order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common Event Format (CEF)

A

A way to organize log data using labels and values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Configuration File

A

A file that sets up how a program works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Endpoint

A

A device like a computer connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Endpoint Detection And Response (EDR)

A

A tool that watches a device for threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

False Positive

A

A warning about a threat that isn’t real

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Host-Based Intrusion Detection System (HIDS)

A

A tool that watches one device for attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intrusion Detection Systems (IDS)

A

A tool that checks for signs of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key-Value Pair

A

A label and its matching value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Log

A

A record of what happened on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Log Analysis

A

Looking at logs to find important events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Log Management

A

Handling logs by collecting and storing them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logging

A

Recording what happens on systems and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network-Based Intrusion Detection System (NIDS)

A

A tool that watches network traffic for attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Object

A

A list of key-value pairs grouped together

17
Q

Search Processing Language (SPL)

A

Splunk’s special search language

18
Q

Security Information And Event Management (SIEM)

A

A tool that collects and checks log data for problems

19
Q

Signature

A

A pattern used to spot bad behavior

20
Q

Signature Analysis

A

Finding threats by looking for known patterns

21
Q

Suricata

A

A tool that watches for attacks and analyzes network traffic

22
Q

Telemetry

A

Data sent to be checked and analyzed

23
Q

Wildcard

A

A symbol that can mean any character

24
Q

YARA-L

A

A language for writing rules to search logs

25
Zero-Day
A new threat that no one knew about before