4.9 Log Data Flashcards

(31 cards)

1
Q

What type of information is commonly stored in log files?

A

Traffic flows, exploit attempts, blocked URLs, DNS sinkhole traffic

Log files contain vital information for analyzing network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can firewall logs provide information about?

A

Source and destination IP addresses, port numbers, traffic flow disposition

Firewalls monitor traffic both entering and leaving the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What additional capabilities do Next Generation Firewalls (NGFW) offer?

A

Application information, feedback on URLs, detection of anomalies

NGFWs enhance security by providing deeper insights into network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What details are typically found in firewall log entries?

A

Time and date, source IP, MAC address, destination IP, application used, disposition

Each entry represents a separate flow of traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where can you find log files on a Windows system?

A

Windows Event Viewer, specifically the application log section

Log files from applications are crucial for security analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Security Information and Event Manager (SIEM)?

A

A system that aggregates and analyzes log data from various sources

SIEMs help in correlating security events across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What types of log information can endpoint devices provide?

A

Log in/out events, system events, password changes, directory services information

Endpoint logs are essential for tracking user activity and security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What security events can operating system log files help monitor?

A

Brute force attacks, changes to critical system files, authentication events

These logs can signal potential security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Only the network devices generate log files.

A

False

Log files are generated by endpoints, applications, and operating systems as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What information can Intrusion Prevention Systems (IPS) logs provide?

A

Known vulnerabilities, types of attacks, source and destination IP addresses

IPS logs are crucial for identifying and responding to threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can network infrastructure devices log?

A

Routing table changes, authentication errors, network attacks

Logs from switches, routers, and access points are vital for network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: The logs from vulnerability scans can identify devices without a _______.

A

firewall configured

Vulnerability scans help in assessing the security posture of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of data can be extracted from document metadata?

A

File descriptions, creator information, device details, GPS coordinates

Metadata can reveal details about how and where a file was created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some examples of information found in email headers?

A

IP addresses, SPF information, transfer process details

Email headers provide insight into the origins and routes of emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What challenges can arise when generating reports from a SIEM?

A

Data overload, report relevance, processing power requirements

Organizations may struggle to effectively utilize the data stored in SIEMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should organizations do with automated reports generated by SIEMs?

A

Read and analyze them

Ignoring reports can lead to missed security alerts and issues.

17
Q

What is a key consideration when generating reports from a SIEM?

A

Finding the right mix between the type of report needed and the time it takes to create it.

18
Q

What can the extensive amount of data in a SIEM lead to when generating reports?

A

It may require extensive processing power and time.

19
Q

What is a benefit of having a summary of information available at a glance?

A

It allows for quicker insights rather than waiting for detailed reports.

20
Q

How can dashboards in SIEMs be customized?

A

They can be customized by the user or come with predefined templates.

21
Q

What type of information is typically displayed on a security operations center dashboard?

A

Current system status, active firewall rules, warnings, and information about users and devices.

22
Q

Why is long-term data often not shown on dashboards?

A

Because compiling long-term data takes too long.

23
Q

What is one of the best sources for gathering network data?

A

The network itself.

24
Q

What utility is mentioned for analyzing packets on a network?

25
What can Wireshark capture data from?
Both wired and wireless networks.
26
What type of devices may have the ability to capture packets internally?
Devices like switches, routers, or firewalls.
27
What does packet capture provide detailed information about?
Traffic flows at the packet level.
28
What is shown in the Wireshark summary view?
A packet by packet breakdown of everything being sent over the network.
29
What type of traffic is highlighted in the Wireshark example?
HTTP traffic.
30
What command is visible in the packet capture for HTTP traffic?
GET command.
31
What does the detail pane in Wireshark provide?
A breakdown of the highlighted frame, including Ethernet data, IPv4 header, TCP header, and HTTP data.