Chapter 12 Monitoring Data and Metadata

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 6

flashcard set

Earn XP

Description and Tags

7 Terms

1
_______________ can help you understand network usage, the protocols being used, users who consume a lot of bandwidth, and who is communicating on the network
bandwidth monitors
New cards
2
Name the type of metadata

\
All of these produce metadata that can be used to identify people, places, times, and even deleted data. Pictures can be timestamped and geolocation stamped. Much of this metadata also reveals origination of the data and the sender.
mobile metadata
New cards
3
Name the type of metadata

\
cookies, browser history, and cached pages. 
web metadata
New cards
4
Name the type of metadata

\
Parts of the headers can be spoofed giving investigators false information. However, there are security devices that put X-headers throughout an email's header. These provide the originating email account and IP address not the spoofed one.
email metadata
New cards
5
Thisis a feature on Cisco routers. It works at layers 2 – 4. It can examine each data flow that comes through the network or it can be set to sample sessions at certain intervals.
NetFlow
New cards
6
________ s a packet sampling technology that works on layers 2 – 7 of the stack. It only can be used in sampling mode. This is a stateless packet sampling that provides information on various layers and does it quickly and efficiently.
sFlow
New cards
7
_____directly integrates data that normally goes to Syslog or SNMP
IPfix
New cards
robot