Chapter 12 Monitoring Data and Metadata

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards
_______________ can help you understand network usage, the protocols being used, users who consume a lot of bandwidth, and who is communicating on the network
bandwidth monitors
2
New cards
Name the type of metadata

\
All of these produce metadata that can be used to identify people, places, times, and even deleted data. Pictures can be timestamped and geolocation stamped. Much of this metadata also reveals origination of the data and the sender.
mobile metadata
3
New cards
Name the type of metadata

\
cookies, browser history, and cached pages. 
web metadata
4
New cards
Name the type of metadata

\
Parts of the headers can be spoofed giving investigators false information. However, there are security devices that put X-headers throughout an email's header. These provide the originating email account and IP address not the spoofed one.
email metadata
5
New cards
Thisis a feature on Cisco routers. It works at layers 2 – 4. It can examine each data flow that comes through the network or it can be set to sample sessions at certain intervals.
NetFlow
6
New cards
________ s a packet sampling technology that works on layers 2 – 7 of the stack. It only can be used in sampling mode. This is a stateless packet sampling that provides information on various layers and does it quickly and efficiently.
sFlow
7
New cards
_____directly integrates data that normally goes to Syslog or SNMP
IPfix