Alerting & Monitoring & Incident Response

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/133

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

134 Terms

1
New cards

What is the main goal of security alerting?

To notify personnel of potential threats.

2
New cards

What type of alert correctly identifies a real threat?

True Positive.

3
New cards

What type of alert falsely indicates a threat where there is none?

False Positive.

4
New cards

What type of situation involves no alert and no threat?

True Negative.

5
New cards

What is a False Negative in alerting?

A real threat occurred but no alert was triggered.

6
New cards

What are two common problems in alerting?

False positives and false negatives.

7
New cards

What is the purpose of monitoring in cybersecurity?

To observe systems/networks for threats or anomalies.

8
New cards

What type of monitoring uses software to scan logs automatically?

Automated Monitoring.

9
New cards

What type of monitoring involves human analysis of logs/data?

Manual Monitoring.

10
New cards

What protocol helps monitor/manage network devices?

SNMP (Simple Network Management Protocol).

11
New cards

What are SNMP traps used for?

Sending automatic alerts from devices.

12
New cards

What does a SIEM system do?

Aggregates and analyzes security data from across the network.

13
New cards

What are two types of SIEM monitoring methods?

Agent-based and Agentless monitoring.

14
New cards

What is SCAP used for?

Automated vulnerability management and compliance checks.

15
New cards

What is a “Single Pane of Glass”?

A unified dashboard displaying security data from multiple sources.

16
New cards

What is the primary purpose of log aggregation in cybersecurity?

To centralize logs for analysis, troubleshooting, and compliance.

17
New cards

What are common tools used for log aggregation?

ELK Stack, Splunk, Graylog.

18
New cards

What is alerting in the context of monitoring systems?

Real-time notifications triggered by defined system thresholds or anomalies.

19
New cards

What might trigger an alert in a network environment?

High CPU usage, failed logins, unusual traffic patterns.

20
New cards

Why is alert tuning important in a SOC (Security Operations Center)?

To reduce false positives and focus on true threats.

21
New cards

What is the purpose of vulnerability scanning?

To identify known security weaknesses or CVEs in systems.

22
New cards

What is the difference between static and dynamic code scanning?

Static scans code without execution; dynamic scans code during execution.

23
New cards

Which tools are commonly used for vulnerability scanning?

Nessus, OpenVAS.

24
New cards

What is a configuration scan used for?

To check system settings against best practices or benchmarks (e.g., CIS).

25
New cards

What role does reporting play in security operations?

It summarizes monitoring data for audits, trend analysis, and compliance.

26
New cards

Why is archiving important in cybersecurity monitoring?

For long-term log retention, audit trails, and forensic analysis.

27
New cards

What is an example of using a monitoring tool to validate remediation?

Running a follow-up scan after patching to confirm the issue is resolved.

28
New cards

What does quarantine mean in incident response?

Isolating an infected or compromised system to prevent spread.

29
New cards

What happens during the alert response phase?

The incident is investigated and escalated based on impact and scope.

30
New cards

Why is validation a critical part of remediation?

It ensures the vulnerability has been successfully mitigated.

31
New cards

What does SIEM stand for?

Security Information and Event Management

32
New cards

What is the primary purpose of a SIEM system?

To centralize, analyze, and correlate logs for real-time threat detection and response.

33
New cards

Why is log correlation important in a SIEM?

It helps identify complex attacks by linking events across different systems.

34
New cards

What are two common deployment methods for SIEM data collection?

Agent-based and agentless

35
New cards

What is a key benefit of using an agent-based SIEM?

Real-time, detailed data collection from endpoints

36
New cards

What is one downside of using an agentless SIEM?

It may lack detail and real-time capabilities

37
New cards

What is the main goal of threat hunting in a SIEM environment?

To detect threats that may have bypassed automated alerts

38
New cards

Why is establishing a ticketing process important when using a SIEM?

To track and manage alerts and investigations

39
New cards

What is a use case in the context of SIEM setup?

A predefined threat scenario that guides alert logic and response

40
New cards

What is the purpose of defining event scope in a SIEM?

To determine which events are relevant for logging and monitoring

41
New cards

Which SIEM tool is open-source and includes Elasticsearch, Logstash, Kibana, and Beats?

ELK Stack (Elastic Stack)

42
New cards

What language does Splunk use for searching logs?

Search Processing Language (SPL)

43
New cards

Which SIEM is commonly used for compliance with HIPAA, SOX, and PCI DSS?

ArcSight

44
New cards

Which company develops QRadar, a well-known SIEM?

IBM

45
New cards

Why is a SIEM useful for compliance audits?

It provides centralized logs and an audit trail for investigation and reporting

46
New cards

What type of data does antivirus software provide to a SIEM?

Malware detections, system scans, and update logs.

47
New cards

Which security tool prevents sensitive data from being exfiltrated outside the organization?

Data Loss Prevention (DLP) systems.

48
New cards

What’s the key difference between NIDS and NIPS?

NIDS detects threats (passive); NIPS blocks threats (active).

49
New cards

How can repeated malware alerts in SIEM from one host be interpreted?

As a possible widespread infection or targeted attack.

50
New cards

What type of event might firewall logs reveal when a threat actor is performing reconnaissance?

Port scans.

51
New cards

What is one major benefit of centralizing logs from multiple tools into a SIEM?

It provides a comprehensive view of the organization’s security posture.

52
New cards

What kind of information can a DLP system flag?

Policy violations, data leaks, and suspicious user behavior.

53
New cards

What do vulnerability scanners provide to a SIEM?

Identified vulnerabilities, severity levels, and remediation steps.

54
New cards

Why is it important to analyze antivirus logs in a SIEM?

To detect persistent threats and monitor system health.

55
New cards

How do NIDS/NIPS logs enhance security monitoring in a SIEM?

By identifying malicious activity, blocked traffic, and unusual patterns.

56
New cards

What does SCAP stand for and what is its primary purpose?

Security Content Automation Protocol; a NIST framework to automate vulnerability management, configuration checking, and compliance evaluation.

57
New cards

What are the three core languages used in SCAP?

OVAL, XCCDF, and ARF.

58
New cards

What is the function of OVAL in SCAP?

Open Vulnerability and Assessment Language; describes system states and security conditions using XML.

59
New cards

What does XCCDF provide in SCAP?

Extensible Configuration Checklist Description Format; defines machine-readable security checklists and configuration rules.

60
New cards

What is the purpose of ARF in SCAP?

Asset Reporting Format; standardizes how asset information and report data are structured and shared.

61
New cards

What are the three types of enumerations used in SCAP?

CCE (configurations), CPE (platforms), and CVE (vulnerabilities).

62
New cards

What does CVE represent in cybersecurity?

What does CVE represent in cybersecurity?

63
New cards

What is the purpose of the CVSS in SCAP?

Common Vulnerability Scoring System; assigns a severity score (0–10) to vulnerabilities to help prioritize remediation.

64
New cards

What score range is considered "High" under CVSS v3?

7.0-8.9

65
New cards

Why are SCAP benchmarks important for system administrators?

They automate system hardening by providing standardized configuration rules in XCCDF format, ensuring security and compliance.

66
New cards

What is the primary difference between full packet capture (FPC) and flow analysis?

FPC captures the entire packet (header + payload), while flow analysis only captures metadata.

67
New cards

Why is flow analysis preferred over full packet capture in many enterprise environments?

It saves storage and processing by collecting metadata instead of full packet content.

68
New cards

What does NetFlow provide visibility into?

Traffic flows including source/destination IPs, ports, protocol, and type of service.

69
New cards

What standardized protocol evolved from Cisco’s NetFlow?

IPFIX (IP Flow Information Export).

70
New cards

What is a major limitation of flow analysis compared to full packet capture?

It cannot provide the actual contents of the data being transferred.

71
New cards

Which tool provides a hybrid solution by capturing full packets only when suspicious activity is detected?

Zeek.

72
New cards

What format does Zeek use to store normalized log data?

JSON or tab-delimited text files.

73
New cards

What is the function of MRTG (Multi Router Traffic Grapher)?

It visualizes traffic volume across network devices using SNMP data.

74
New cards

How can flow analysis assist in identifying data exfiltration?

By revealing traffic anomalies like unexpected data spikes during off-hours.

75
New cards

What type of tool would you use to identify protocols, volume, and sessions without inspecting payload content?

A flow analysis tool such as NetFlow or IPFIX.

76
New cards

What is a "Single Pane of Glass" (SPoG) in cybersecurity?

A centralized dashboard providing unified access to security tools, logs, alerts, and reports.

77
New cards

Why is a Single Pane of Glass important for security operations?

It allows security teams to monitor and manage the security posture efficiently from one interface.

78
New cards

What is one major benefit of using a Single Pane of Glass for threat detection?

It helps detect and respond to threats more quickly by consolidating data in one view.

79
New cards

How does a SPoG reduce manual workload for security teams?

By automating repetitive tasks like log collection and analysis.

80
New cards

How does SPoG improve collaboration within a security team?

It allows easy data sharing and coordination through a unified dashboard.

81
New cards

Is a Single Pane of Glass typically software-based or hardware-based?

Software-based, due to greater flexibility and integration options.

82
New cards

What is the first step when implementing a SPoG solution?

Defining the requirements – identifying the tools, systems, and data needed.

83
New cards

What does the integration step of SPoG implementation involve?

Connecting data sources like IDS or log servers using APIs, plugins, or connectors.

84
New cards

Why is customizing the SPoG interface important?

To create an organized layout that helps teams navigate and interpret security data efficiently.

85
New cards

How does a Single Pane of Glass support regulatory compliance?

It simplifies generating reports and logs needed to demonstrate compliance.

86
New cards

What is the purpose of the "Preparation" phase in the incident response process? (Think: warming up before a heavy lift)

To strengthen systems in advance by creating policies, training staff, and developing plans to handle potential incidents.

87
New cards

In the gym analogy, what phase is like noticing joint pain during a lift?

Detection – spotting signs that an incident may have occurred.

88
New cards

Which phase involves analyzing the incident deeply to determine the impact, like a trainer reviewing your form and identifying why you're in pain?

Analysis.

89
New cards

What is the goal of the "Containment" phase in incident response? (Think: putting on a brace mid-workout to stop further damage)

To limit the spread of the incident and reduce its impact.

90
New cards

Which IR phase is like removing a knot from a tight muscle using a foam roller or therapist?

Eradication – removing the malicious element from the system.

91
New cards

What happens during the “Recovery” phase? (Think: light exercises to safely return after injury)

Systems are restored, patched, and monitored to return to normal operations securely.

92
New cards

What is the goal of “Post-Incident Activity” in IR? (Like reviewing your lift with a coach to improve next time)

To review what happened, identify improvements, and document lessons learned to strengthen future responses.

93
New cards

What are the 7 phases of the CompTIA incident response model?

Preparation, Detection, Analysis, Containment, Eradication, Recovery, and Post-Incident Activity.

94
New cards

Why is the “Preparation” phase essential to success in IR? (Think: preventing injury before it starts)

It builds resilience by preparing tools, policies, and communication channels before incidents occur.

95
New cards

How does the IR team relate to a gym support team?

Like trainers, therapists, and nutritionists support an athlete, the IR team includes IT, cybersecurity, legal, HR, and PR roles to recover the organization effectively.

96
New cards

What is the purpose of incident response training?

To educate employees on the procedures, priorities, and responsibilities during a security incident.

97
New cards

What is the difference between training and testing in incident response?

Training teaches what to do during an incident, while testing evaluates the ability to execute the procedures effectively.

98
New cards

Who should receive incident response training?

All relevant employees, including technical responders, managers, executives, and end users.

99
New cards

What is the primary focus of end-user training in incident response?

Teaching users how to identify and report suspicious activity, such as phishing emails, and preventing future incidents.

100
New cards

Why should incident response training include lessons learned from past incidents?

To prevent repeat mistakes by applying previous experiences to improve response actions.