4.4 Security Tools Flashcards

(37 cards)

1
Q

What is SCAP?

A

Security Content Automation Protocol

SCAP is maintained by the National Institute of Standards and Technology (NIST) and consolidates vulnerabilities into a single language for better understanding across different security tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main purpose of SCAP?

A

To allow diverse security tools to identify the same vulnerability using a unified language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a vulnerability scanner do?

A

Identifies devices with vulnerabilities and can automate the patching process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the benefit of automating the patching process?

A

Reduces the need for human intervention and can efficiently manage multiple devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What organization provides extensive security benchmarks?

A

Center for Internet Security (CIS)

Their website can be visited at cissecurity.org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a security benchmark?

A

A set of security best practices that ensures systems are configured securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of system checks can be performed for compliance?

A

Agent-based and agentless checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an advantage of agent-based systems?

A

Always on and running to ensure compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a disadvantage of agent-based systems?

A

Requires ongoing maintenance and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a SIEM?

A

Security Information and Event Manager

SIEMs consolidate log files to a central database for reporting and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary function of a SIEM?

A

To consolidate log files and create reports on security performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What types of malware can antivirus and anti-malware tools identify?

A

Trojan horses, worms, macro viruses, spyware, ransomware, fileless malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does DLP stand for?

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of DLP?

A

To monitor and block the transfer of sensitive data across networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What protocol is used for monitoring software built into systems?

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Management Information Base (MIB)?

A

A database of information collected on a system monitored by SNMP

17
Q

What are object identifiers (OID)?

A

A group of numbers used to identify metrics in a MIB

18
Q

What is an SNMP trap?

A

A proactive alert sent from a device to a management station when a specific event occurs

19
Q

What is NetFlow used for?

A

Monitoring traffic flows and application use statistics

20
Q

What type of information does SNMP gather?

A

Lower level metrics such as utilization and packet counts

21
Q

True or False: DLP can only be implemented on network appliances.

A

False

DLP can also be implemented on endpoints and cloud-based systems.

22
Q

Fill in the blank: The _______ allows for the automation of vulnerability detection and removal.

A

Security Content Automation Protocol (SCAP)

23
Q

What happens during an agentless check?

A

Runs without formal installation and checks compliance upon login or connection

24
Q

What is a key challenge in maintaining device security?

A

Constant changes and new vulnerabilities emerging

25
What is NetFlow?
A standard for monitoring traffic flows and looking at statistics relating to application use. ## Footnote NetFlow allows for detailed analysis of network traffic and application performance.
26
What are the components involved in NetFlow?
NetFlow compatible agents, NetFlow management stations, hardware devices, probes, and collectors. ## Footnote These components work together to gather and analyze network traffic data.
27
How does a NetFlow probe collect data?
By compiling information for traffic flows, either built into a switch/router or as a separate external probe. ## Footnote Probes can connect through monitoring ports or physical taps.
28
What is a Switched Port Analyzer (SPAN)?
A monitoring port from a switch that connects to a NetFlow probe. ## Footnote SPAN allows for the collection of traffic data without disrupting network performance.
29
What does a NetFlow collector do?
Receives metrics from probes to create reports and details about application traffic flows. ## Footnote This data is crucial for network analysis and troubleshooting.
30
What type of information can be obtained from a NetFlow collector?
Top 10 conversations, top 10 endpoints by IP address or domain name, and traffic sources. ## Footnote This information helps in understanding network usage and performance.
31
What is a vulnerability scanner?
A tool designed to gather details about potential vulnerabilities in systems without performing exploits. ## Footnote It helps in assessing the security posture of a network.
32
What additional functionality do many vulnerability scanners provide?
They can perform port scans to identify services installed on devices. ## Footnote This helps in understanding what services may be vulnerable.
33
What is the benefit of performing vulnerability scans from outside the network?
To gain perspective on what a potential attacker might see. ## Footnote This external view can reveal vulnerabilities not visible from within the network.
34
Why is it important to verify information collected by vulnerability scans?
Not everything collected is entirely accurate, and verification helps ensure security accuracy. ## Footnote False positives can lead to unnecessary remediation efforts.
35
What types of vulnerabilities can be identified in a vulnerability scan?
Critical, high, medium, low, and informational vulnerabilities. ## Footnote Understanding the severity helps prioritize remediation efforts.
36
What is one example of a critical vulnerability found in a scan?
An issue with the random number generator on a server. ## Footnote This vulnerability could allow unauthorized remote access.
37
Why is it important to run vulnerability scans regularly?
To avoid having critical or high-level vulnerabilities active on the network. ## Footnote Regular scans help maintain security hygiene and compliance.