Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
CompTIA Security + (SY0-701)
> Section 25.243 Endpoint Log > Flashcards
Section 25.243 Endpoint Log Flashcards
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
(0 cards)
Study These Flashcards
CompTIA Security + (SY0-701)
flashcards
Decks in class (238)
# Cards
Section 2.5 Threats and Vulnerabilities
3
Section 2.6 Confidentiality
3
Section 2.7 Integrity
3
Section 2.8 Availability
5
Section 2.9 Non-Repudiation
4
Section 2.10 Authentication
4
Section 2.11 Authorisation
2
Section 2.12 Accounting
3
Section 2.13 Security control categories
5
Section 2.14 Security control types
7
Section 2.15 Gap Analysis
5
Section 2.16 Zero Trust
6
Section 3.18 Threat Actor
4
Section 3.19 Threat Actor Attributes
3
Section 3.20 Unskilled Attackers
3
Section 3.21 Hacktivists
6
Section 3.22 Organised Crime
5
Section 3.23 Nation State Actor
7
Section 3.24 Insider Threats
4
Section 3.25 Shadow IT
3
Section 3.26 Threat Vectors and Attack Surfaces
9
Section 3.27 Outsmarting Threat Actors
8
Section 4.29 Physical Security: Fencing and Bollards
4
Section 4.30 Attacking with Brute Force
4
Section 4.31 Surveillance Systems
6
Section 4.32 Bypassing Surveillance Systems
6
Section 4.33 Access Control Vestibule's
5
Section 4.34 Door Locks
4
Section 4.35 Access Badge cloning
3
Section 5.37 Social Engineering Motivation Triggers
8
Section 5.38 Impersonation
5
Section 5.39 Pretexting
1
Section 5.40 Phishing Attacks
7
Section 5.41 Preventing Phishing Attacks
4
Section 5.42 Conducting an Anti-Phishing attack
1
Section 5.43 Frauds and Scams
6
Section 5.44 Influence Campaigns
3
Section 5.45 Other Social Engineering Attacks
9
Section 6.46 Malware
3
Section 6.47 Viruses
12
Section 6.48 Worms
3
Section 6.49 Trojans
2
Section 6.51 Ransomware
4
Section 6.52 Zombies and Botnets
5
Section 6.53 Rootkits
9
Section 6.54 Backdoors and Logic Bombs
3
Section 6.55 Keylogger
4
Section 6.56 Spyware and Bloatware
5
Section 6.57 Malware Attack Techniques
10
Section 6.58 Indications of Malware attacks
9
Section 7.60 Data Protection and Classifications
8
Section 7.61 Data Ownership
9
Section 7.62 Data States
6
Section 7.63 Data Types
9
Section 7.64 Data Sovereignty
4
Section 7.65 Securing Data
8
Section 7.66 Data Loss Prevention (DLP)
5
Section 8.68 Cryptographic Solutions: Symmetric v Asymmetric
3
Section 8.69 Symmetric vs Asymmetric
5
Section 8.70 Symmetric Algorithms
6
Section 8.71 Asymmetric Algorithms
7
Section 8.72 Hashing
9
Section 8.73 Increasing Hash Security
6
Section 8.74 Public Key Infrastructure (PKI)
4
Section 8.75 Digital Certificates
17
Section 8.77 Blockchain
7
Section 8.78 Encryption Tools
5
Section 8.79 Obfuscation
3
Section 8.80 Cryptographic Attacks
10
Section 9.81 Risk Management
6
Section 9.82 Risk Assessment Frequency
6
Section 9.83 Risk Identification and Analysis
7
Section 9.84 Risk Register
12
Section 9.85 Qualitative Risk Analysis
3
Section 9.86 Quantitative Risk Analysis
6
Section 9.87 Risk Management Strategies
6
Section 9.89 Risk Monitoring and Reporting
8
Section 10.90 Third-party Vendor Risks & Supply Chain Risks
6
Section 10.91 Supply Chain Attacks
3
Section 10.92 Vendor Assessment
9
Section 10.93 Vendor Selection and Monitoring
5
Section 10.94 Contracts and Agreements
8
Section 11.95 Governance and Compliance
10
Section 11.96 Governance
4
Section 11.97 Governance Structures
6
Section 11.98 Policies
7
Section 11.99 Standards
5
Section 11.100 Procedures
4
Section 11.101 Governance Considerations
4
Section 11.102 Compliance
11
Section 11.103 Non-compliance Consequences
6
Section 12.104 Asset and Change Management
2
Section 12.105 Acquisition and Procurement
7
Section 12.106 Mobile Asset Deployments
4
Section 12.107 Asset Management
10
Section 12.108 Asset Disposal and Decommissioning
12
Section 12.109 Change Management
7
Section 12.110 Change Management process
9
Section 12.111 Technical Implications of Changes
7
Section 12.112 Documenting Changes
6
Section 13.113 Audits and Assessments
6
Section 13.114 Internal Audits and Assessments
10
Section 13.115 Performing an Internal Assessment
5
Section 13.116 External Audits and Assessments
7
Section 13.117 Performing an External Assessment
4
Section 13.118 Penetration Testing
5
Section 13.119 Reconnaissance in Pentesting
7
Section 13.120 Performing a Basic PenTest
1
Section 113.121 Attestation of Findings
7
Section 14.122 Cyber Resilience and Redundancy
4
Section 14.123 High Availability
9
Section 14.124 Data Redundancy
9
Section 14.126 Capacity Planning
5
Section 14.127 Powering Data Centers
10
Section 14.128 Data Backups
11
Section 14.129 Continuity of Operations Plan
7
Section 14.130 Redundant Site Considerations
12
Section 14.131 Resilience and Recovery Testing
7
Section 15.133 Security Architecture: On Premise vs The Cloud
19
Section 15.134 Cloud Security
16
Section 15.135 Virtualisation and Containerisation
11
Section 15.136 Serverless
7
Section 15.137 Microservices
9
Section 15.138 Network Infrastructure
4
Section 15.139 Software-defined Network (SDN)
5
Section 15.140 Infrastructure as Code (IaC)
8
Section 15.141 Centralised vs Decentralised Architectures
14
Section 15.142 Internet of Things (IoT)
7
Section 15.143 ICS and SCADA
13
Section 15.144 Embedded Systems
10
Section 16.146 Security Infrastructure: Ports and Protocols
37
Section 16.147 Firewalls
11
Section 16.148 Configuring Firewalls
7
Section 16.149 IDS and IPS
9
Section 16.150 Network Appliances
5
Section 16.151 Port Security
13
Section 16.152 Securing Network Communications
19
Section 16.153 SD-WAN and SASE
11
Section 16.154 Infrastructure Considerations
7
Section 16.155 Selecting Infrastructure Controls
17
Section 17.156 Identity and Access Management (IAM) Solutions
6
Section 17.157 Identity and Access Management (IAM)
10
Section 17.158 Multi-factor Authentication
11
Section 17.159 Password Security
18
Section 17.160 Password Attacks
9
Section 17.161 Single Sign-On (SSO)
7
Section 17.162 Federation
9
Section 17.163 Privileged Access Management (PAM)
4
Section 17.164 Access Control Models
7
Section 17.165 Assigning Permissions
7
Section 18.166 Vulnerabilities and Attacks
2
Section 18.167 Hardware Vulnerabilities
13
Section 18.168 Bluetooth Vulnerabilities and Attacks
16
Section 18.169 Mobile Vulnerabilities and Attacks
7
Section 18.170 Zero-day Vulnerabilities
4
Section 18.171 Operating System Vulnerabilities
6
Section 18.172 SQL and XML Injections
10
Section 18.174 XSS and XSRF
18
Section 18.175 Buffer Overflow
6
Section 18.176 Race Conditions
9
Section 19.178 Malicious Activity: and Distributed Denial of Service
14
Section 19.179 Domain Name System (DNS) Attacks
6
Section 19.180 Directory Traversal Attack
5
Section 19.181 Execution and Escalation Attacks
11
Section 19.182 Replay Attacks
5
Section 19.183 Session Hijacking
7
Section 19.184 On-path Attacks
10
Section 19.185 Injection Attacks
4
Section 19.186 Indicators of compromise (IoC)
10
Section 20.188 Hardening: and Changing Default Configurations
4
Section 20.189 Restricting Applications
8
Section 20.190 Unnecessary Services
1
Section 20.191 Trusted Operating Systems
5
Section 20.192 Updates and Patches
6
Section 20.193 Patch Management
5
Section 20.194 Group Policies
8
Section 20.195 SELinux Policies
17
Section 20.196 Data Encryption Levels
7
Section 20.197 Secure Baselines
6
Section 21.199 Security Techniques: and Wireless Infrastructure Security
7
Section 21. 200 Wireless Security Settings
18
Section 21.201 Application Security
7
Section 21.202 Network Access Control (NAC)
9
Section 21.203 Web and DNS Filtering
8
Section 21.204 Email Secuirty
9
Section 21.205 Endpoint Detection and Response
10
Section 21.206 User Behaviour Analytics
6
Section 21.207 Selecting Secure Protocols
8
Section 22.209 Vulnerability Management: & Identifying Vulnerabilities
13
Section 22.210 Threat Intelligence Feeds
7
Section 22.211 Responsible Disclosure Programs
3
Section 22.212 Analysing Vulnerabilities
11
Section 22.213 Conducting Vulnerability Scans
1
Section 22.214 Assessing Vulnerability Scan Reports
1
Section 22.215 Vulnerability Response and Remediation
6
Section 22.216 Validating Vulnerability Remediation
7
Section 22.217 Vulnerability Reporting
5
Section 23.219 Alerting and Monitoring: & Monitoring Resources
11
Section 23.220 Alerting and Monitoring Activities
11
Section 23.221 Simple Network Management Protocol (SNMP)
14
Section 23.222 Security Information and Event Management (SIEM)
10
Section 23.223 Data from Security Tools
7
Section 23.224 Security Content Automation and Protocol (SCAP)
12
Section 23.225 Network and Flow Analysis
12
Section 23.226 Single Pane of Glass
7
Section 24.228 Incident Response: & Incident Response Process
18
Section 24.229 Threat Hunting
6
Section 24.230 Root Cause Analysis
7
Section 24.231 Incident Response Training and Testing
5
Section 24.232 Digital Forensic Procedures
11
Section 24.233 Data Collection Procedures
6
Section 24.234 Disk Imaging and Analysis
1
Section 25.236 Investigating an Incident: & Investigate data
15
Section 25.237 Dashboards
3
Section 25.238 Automated Reports
12
Section 25.239 Vulnerability Scans
5
Section 25.240 Packet Captures
2
Section 25.241 Firewall Logs
1
Section 25.242 Application Logs
0
Section 25.243 Endpoint Log
0
Section 25.244 OS-specific Security Logs
0
Section 25.245 IPS/IDS Logs
1
Section 25.246 Network Logs
0
Section 25.247 Metadata
2
Section 26.248 Automation and Orchestration
6
Section 26.249 When to Automate and Orchestrate
6
Section 26.250 Benefits of Automation and Orchestration
8
Section 26.251 Automating Support Tickets
5
Section 26.252 Automating Onboarding
7
Section 26.253 Automating Security
5
Section 26.254 Automating Application Development
5
Section 26.255 Integrations and APIs
7
Section 27.257 Security Awareness: & Recognising Insider Threats
7
Section 27.258 Objective 5.6 Password Managers
4
Section 27.259 Avoiding Social Engineering
10
Section 27.260 Policy and Handbooks
10
Section 27.261 Remote and Hybrid Work Environments
4
Section 27.262 Creating a Culture of Security
7