11.4.12 Security Assessment Techniques Section Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which SIEM component is responsible for gathering all event logs from configured devices and securely sending them to the SIEM system?

Collectors Collectors are responsible for gathering all event logs from configured devices and securely sending them to the Security Information and Event Management (SIEM) system. Collectors are basically the middleman between devices and the SIEM system. The data handling component receives the data from the collectors and then reads, analyzes, and separates the data into different categories. SIEM alerts are responsible for triggering alerts if any data exceeds the established thresholds. Security automation is a feature of a SOAR system.

A security administrator logs onto a Windows server on her organization's network. Then she runs a vulnerability scan on that server. Which type of scan was conducted in this scenario?

Credentialed scan In a credentialed scan, the security administrator authenticates to the system prior to starting the scan. A credentialed scan usually provides detailed information about potential vulnerabilities. For example, a credentialed scan of a Windows workstation allows you to probe the registry for security vulnerabilities. With a non-credentialed scan, the security administrator does not authenticate to the system prior to running the scan. An intrusive scan finds a potential vulnerability and then actively attempts to exploit it. A non-intrusive scan is the more common type of scan performed.

In your role as a security analyst, you ran a vulnerability scan, and several vulnerabilities were reported. Upon further inspection, none of the vulnerabilities actually existed. Which type of result is this?

False positive False positives occur when a scan says there is a vulnerability, but there is none. They happen as a matter of course and should be discovered during the follow-up to the scan. False negatives occur when the scanner misses a vulnerability. True negatives occur when the scanner says there are no vulnerabilities and there are none. True positives occur when the scanner shows a vulnerability that does exist.

A security administrator needs to run a vulnerability scan that analyzes a system from the perspective of a hacker attacking the organization from the outside. Which type of scan should he or she use?

Non-credentialed scan In a non-credentialed scan, the security administrator does not authenticate to the system prior to running the scan. A non-credentialed scan can be valuable because it allows the scanner to see the system from the same perspective that an attacker would see it. However, a non-credentialed scan does not typically produce the same level of detail as a credentialed scan. In a credentialed scan, the security administrator authenticates to the system prior to starting the scan. A port scan probes systems for open ports, but it does not run a full vulnerability assessment. A network-mapping scan is a type of port scan that discovers devices on the network and then organizes those devices in a graphical display.

Which of the following Security Orchestration, Automation, and Response (SOAR) system automation components is often used to document the processes and procedures that are to be used by a human during a manual intervention?

Playbook Playbooks are linear checklists of required steps and actions that are to be taken to respond to an alert. While playbooks do support automated actions, they are often used to document the processes and procedures that are to be used by a human during a manual intervention. Runbooks consist of a series of conditional steps to perform actions, such as sending notifications or threat containment. They are not used to document the processes and procedures that are to be used by a human during a manual intervention. The Orchestration component of the Security Orchestration, Automation, and Response (SOAR) system is responsible for gathering data and information from across the network. This is not used to document the processes and procedures that are to be used by a human during a manual intervention. The Response component of a SOAR system allows the system to automatically take actions against threats. It is not used to document the processes and procedures used by a human during a manual intervention.

You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers do not accept packets sent to those services. Which tool should you use?

Port scanner Use a port scanner to check for open ports on a system or firewall. Compare the list of open ports with the list of ports allowed by your network design and security policy. Typically, a port is open when a service starts or is configured on a device. Open ports for unused services expose the server to attacks directed at that port. Use a packet sniffer to examine packets on a network. With a packet sniffer, you can identify packets directed toward specific ports, but you won't be able to tell if those ports are open. Examine system logs to look for events that have happened on a system. These events might include a service starting up, but this would not likely reflect open ports. An intrusion detection system (IDS) is a special network device that can detect attacks and suspicious activity. A passive IDS monitors, logs, and detects security breaches, but it takes no action to stop or prevent an attack. An active IDS (also called an intrusion protection system, or IPS) performs the functions of an IDS but can also react when security breaches occur.

You have run a vulnerability scanning tool and identified several patches that need to be applied to a system. What should you do next after applying the patches?

Run the vulnerability assessment again. After fixing an identified vulnerability, you should re-run the vulnerability scan to verify that everything has been fixed and that additional issues are not present. You should update definition files before you run the first scan. Using a port scanner is unnecessary because most vulnerability scanners include a check of open ports. Documenting your actions should occur after you have finished all necessary actions.

Which of the following systems is able to respond to low-level security events without human assistance?

SOAR Security Orchestration, Automation, and Response (SOAR) systems gather and analyze data like SIEM systems, but they take the analysis to the next level. SOAR is a solution stack of compatible software programs that allow an organization to collect data about security threats from multiple sources and respond to low-level security events without human assistance. Security Information and Event Management (SIEM) tools work by gathering different types of network information and data. This information is moved to one central place. SIEM systems are great tools that help network administrators filter data and improve security monitoring. Still, all alerts require manual intervention. Intrusion detection systems (IDSs) can trigger alerts, but these systems do not respond to security threats on their own. A firewall blocks traffic based on the configuration setup. However, firewalls do not respond to security threats on their own.

In your role as a security analyst, you need to stay up to date on the latest threats. You are currently reviewing the latest real-time updates on cyberthreats from across the world. Which of the following resources are you MOST likely using?

Threat feeds Threat feeds provide real-time updates on cyberthreats across the world. They can provide information such as suspicious domains, known malware, known malicious IP addresses, and more. The tracert command shows the path a packet takes to reach its destination. This is not the best tool to check for connectivity between two network devices. Advisories and bulletins are usually updated weekly and provide much more detailed information on the newest threats. Intelligence fusion is the sharing of information between multiple government agencies and private security firms. Threat hunting is the human-based, proactive and methodical monitoring of a network, systems, and software. This is done in order to detect any suspicious activity that may have evaded the automated tools.

You want to be able to identify the services running on a set of servers on your network. Which tool would BEST give you the information you need?

Vulnerability scanner Use a vulnerability scanner to gather information about systems such as the applications or services running on a system. A vulnerability scanner often combines functions found in other tools and can perform additional functions, such as identifying open firewall ports, missing patches, and default or blank passwords. A port scanner is a tool that probes systems for open ports. A port scanner tells you which ports are opened in the firewall, but it cannot identify services running on a server if the firewall port has been closed. A network mapper is a tool that can discover devices on a network and shows those devices in a graphical representation. Network mappers typically use a ping scan to discover devices and a port scanner to identify open ports on those devices. Use a protocol analyzer to identify traffic that is sent on the network medium and traffic sources. Services could still be running on a server that do not generate network traffic that a protocol analyzer would catch.


Conjuntos de estudio relacionados

EXAM 2 (chapters 10,12,13, 18,27,29)

View Set

Reglas Para El Uso De La C, S, Z, X.

View Set

Biology 103 - Module 7 Study Guide

View Set

Medical-Surgical:Cardiovascular and Hematology

View Set

Chapter 7: Positive Organizational Behavior

View Set

MKTG 445 - Global Marketing Exam 1

View Set