Chapter 2 Questions Flashcards

(23 cards)

1
Q

Which sequence correctly represents NSM processing?

A. Detector → Sensor → Parser → Actuator
B. Sensor → Parser → Integrator → Detector
C. Parser → Sensor → Detector → Inspector
D. Integrator → Sensor → Detector → Parser

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A system combines duplicate alerts into a single event.

Which component is responsible?

A. Sensor
B. Parser
C. Integrator
D. Detector

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which detection method is MOST likely to produce false positives?

A. Signature-based
B. Rule-based
C. Unsupervised ML
D. Static analysis

A

Answer:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is the FIRST step in NSM?

A. Detector
B. Parser
C. Sensor
D. Actuator

A

Answer: C

Explanation:
Sensor collects raw data first → everything else depends on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which component standardises log formats?

A. Sensor
B. Parser
C. Integrator
D. Detector

A

Answer: B

Explanation:
Parser converts logs into a common structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which component combines multiple data sources?

A. Detector
B. Parser
C. Integrator
D. Sensor

A

Answer: C

Explanation:
Integrator correlates events and removes duplicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which detection method cannot detect zero-day attacks?

A. Unsupervised ML
B. Behavioural
C. Signature-based
D. Statistical

A

Correct answer: C. Signature‑based

Signature‑based detection cannot identify zero‑day attacks because it relies on known patterns, hashes, or signatures of previously discovered threats. A zero‑day exploit is new and unknown, so no signature exists yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main purpose of Network Security Monitoring (NSM)?

A. Prevent all attacks
B. Detect intrusions and respond
C. Encrypt traffic
D. Replace firewalls

A

Answer: B

Explanation:
NSM focuses on detecting attackers already inside the network and responding quickly. Unlike prevention tools, NSM assumes attacks will happen (“prevention will fail”) and emphasises visibility, detection, and response before damage occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does NSM differ from continuous monitoring?

A. NSM focuses on vulnerabilities
B. Continuous monitoring focuses on attackers
C. NSM is threat-centric
D. Both are the same

A

Answer: C

Explanation:
NSM is threat-centric, meaning it focuses on identifying adversaries and malicious activity. Continuous monitoring is vulnerability-centric, focusing on system weaknesses and configurations. This distinction is frequently tested in exams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a sensor do in NSM?

A. Analyse logs
B. Collect network data
C. Correlate events
D. Respond to attacks

A

Answer: B

Explanation:
Sensors collect raw data such as packets or logs from network devices. Tools like Wireshark act as sensors. This is the first step in NSM, as all analysis depends on the data collected at this stage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is parsing?

A. Encrypting logs
B. Extracting structured data from logs
C. Deleting logs
D. Blocking traffic

A

Answer: B

Explanation:
Parsing converts raw log data into a structured format. Since logs come from different systems with different formats, parsing ensures consistency so they can be analysed and correlated effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the integrator do?

A. Collect logs
B. Standardise logs
C. Correlate events
D. Execute malware

A

Answer: C

Explanation:
The integrator combines data from multiple sources and correlates related events. This helps identify patterns such as multiple alerts forming a single attack. It also reduces redundancy in collected data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which detection method cannot detect zero-day attacks?

A. Unsupervised ML
B. Behavioural
C. Signature-based
D. Statistical

A

Answer: C

Explanation:
Signature-based detection relies on known attack patterns. Since zero-day attacks are new and unknown, they do not have signatures, making them undetectable by this method. This is a key limitation discussed in lectures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of an actuator?

A. Collect logs
B. Analyse traffic
C. Perform response actions
D. Store data

A

Answer: C

Explanation:
The actuator is responsible for responding to detected threats, either manually or automatically. This can include actions like blocking IPs, isolating systems, or triggering alerts to security teams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NSM is:

A. Vulnerability-centric
B. Threat-centric
C. Encryption-based
D. Policy-based

A

Answer: B

Explanation:
NSM is threat-centric, meaning it focuses on identifying adversaries and malicious activity. This differs from continuous monitoring, which focuses on system weaknesses rather than attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Continuous monitoring focuses on:

A. Attackers
B. Vulnerabilities
C. Logs
D. Encryption

A

Answer: B

Explanation:
Continuous monitoring tracks system configurations and vulnerabilities to ensure systems remain secure. It is proactive, while NSM is reactive and focused on detecting threats.

17
Q

What does a sensor do?

A. Analyse logs
B. Collect network data
C. Correlate events
D. Respond

A

Answer: B

Explanation:
Sensors collect raw data such as network traffic or logs. Tools like Wireshark act as sensors. This data is then passed to other NSM components for processing and analysis.

18
Q

What is parsing?

A. Encrypt logs
B. Convert logs into structured format
C. Delete logs
D. Block traffic

A

Answer: B

Explanation:
Parsing extracts relevant information from raw logs and converts it into a structured format. This is important because logs from different systems have different formats, and parsing standardises them.

19
Q

What does the integrator do?

A. Collect logs
B. Standardise logs
C. Correlate events
D. Execute malware

A

Answer: C

Explanation:
The integrator combines data from multiple sources and correlates related events. This helps identify patterns and reduces duplicate alerts, improving detection accuracy.

20
Q

Detector role?

A. Collect data
B. Identify suspicious activity
C. Store logs
D. Encrypt

A

Answer: B

Explanation:
The detector analyses data to identify malicious behaviour. It may use signature-based methods or data-driven approaches such as machine learning to detect anomalies.

21
Q

Signature-based detection:

A. Detects unknown attacks
B. Detects known patterns
C. Uses ML
D. Encrypts logs

A

Answer: B

Explanation:
Signature-based detection works by matching activity against known attack patterns. It is effective for known threats but cannot detect new or unknown attacks (zero-days).

22
Q

Which can detect zero-day attacks?

A. Signature-based
B. Supervised ML
C. Unsupervised ML
D. Rule-based

A

Answer: C

Explanation:
Unsupervised machine learning detects anomalies by identifying behaviour that deviates from normal patterns. This allows it to potentially detect previously unknown attacks, although it may produce false positives.

23
Q

What does an actuator do?

A. Collect logs
B. Analyse data
C. Respond to incidents
D. Store logs

A

Answer: C

Explanation:
The actuator performs response actions after an incident is detected. This may include blocking IP addresses, isolating systems, or triggering automated responses to mitigate threats.