Security + Domain 4 Alerting & Monitoring

4.0(1)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Simple Network Management Protocol (SNMP)

protocol used to collect info about devices on a network and change their settings to manage how they work.

2
New cards

Granular

precise level of control applied to access permissions, policies, or monitoring.

3
New cards

Management Information Base (MIB)?

A database that tells SNMP tools what data to collect, how it's organized, and how to interpret it.

4
New cards

verbose

setting in tools and logs that provides descriptive output, often used for troubleshooting or analysis

5
New cards

security content automation protocol (SCAP)

rules that help computers Check for vulnerabilities, Measure security settings, & stay compliant with government or industry standards

6
New cards

Open Vulnerability Assessment Language (OVAL)

XML-based standard used to describe the security state of computer systems

7
New cards

Extensible Configuration Checklist Description Format (XCCDF):

XML format for defining, managing, and testing security checklists and configuration rules.

8
New cards

Asset Reporting Format (ARF)

sharing info about IT assets and their security status.

9
New cards

Common Configuration Enumeration (CCE)

Gives unique IDs to specific security configuration issues on systems.

10
New cards

Common Platform Enumeration (CPE)

Standard naming system for software, operating systems, and hardware platforms.

11
New cards

Common Vulnerabilities and Exposures (CVE)

digital “wanted list” that gives each known cyber threat its own ID

12
New cards

Common Vulnerability Scoring System (CVSS)

It’s a system that gives each cyber weakness a score to show how serious or dangerous it is

13
New cards

Benchmark

best practices used to measure and evaluate how well a system performing in security

14
New cards

Full Packet Capture (FPC)

means recording all the data packets that pass through a network

15
New cards

flow analysis

studying the patterns of data moving across a network

16
New cards

NetFlow

tool that collects and records information about network traffic flows.

17
New cards

IP Flow Information Export (IPFIX)

defines and exports traffic flows by grouping packets with shared characteristics

18
New cards

Zeek

network security monitoring tool that analyzes network traffic in real time to detect suspicious behavior

19
New cards

Multi Router Traffic Grapher (MRTG)

is a tool that monitors and graphs the traffic load on network devices,

20
New cards

Single pane of glass

central point of access of all information, tools, and systems