Security operations Flashcards

(20 cards)

1
Q

Why is time synchronization critical in log ingestion?

A

It lets analysts correlate events accurately across multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main tradeoff of higher logging levels?

A

More detail improves detection but increases storage and noise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Windows Registry commonly used for in investigations?

A

To review persistence, configuration, and user/system activity artifacts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are default-deny firewall rules valuable?

A

They block traffic unless it is explicitly allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is network segmentation designed to reduce?

A

Lateral movement between systems and security zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does network access control (NAC) enforce?

A

Device or user compliance before granting network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the key difference between hashing and encryption?

A

Hashing is one-way; encryption is reversible with the right key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of data loss prevention (DLP)?

A

To detect and stop unauthorized movement of sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does an ‘impossible travel’ alert usually indicate?

A

A user account appears to log in from distant locations too quickly to be legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does periodic outbound traffic to the same destination often suggest?

A

Beaconing to command-and-control infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is unauthorized software installation a host-based indicator of compromise?

A

It may show policy violation, malware execution, or persistence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can unexpected service restarts or interruptions indicate?

A

Application instability, exploitation attempts, or malicious tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main role of endpoint detection and response (EDR)?

A

To monitor endpoints and support detection, investigation, and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a SIEM primarily used for?

A

To aggregate, normalize, correlate, and alert on security data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why would an analyst use Wireshark?

A

To inspect packet-level network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why might an analyst submit a file hash to VirusTotal?

A

To check whether multiple security vendors already flag it as malicious.

17
Q

What is the difference between an IOC and an IOA?

A

An IOC points to evidence of compromise; an IOA points to suspicious behavior.

18
Q

What are TTPs in threat intelligence?

A

Tactics, techniques, and procedures used by an adversary.

19
Q

What does a high confidence rating mean in threat intelligence?

A

The source or assessment is considered more reliable and well-supported.

20
Q

What is a SOAR platform used for?

A

To automate and orchestrate security workflows and response actions.