Network, HOST IDS/ SNORT
Buffer Overflow
SEIM Rules
Splunk
Pen Testing
100

Different behavior on network - out of Norm

anomaly

100

Sequential segment of memory location allocated for containing data such as a character string or an array of integers.

buffer

100

What does normalization help you with?

Potential answers: 

1.It makes messages human readable 

2.It helps to standardize messages

100

Machine data makes up for more than ___% of the data accumulated by organizations.

90

100

Pen testing is

a controlled attempt and exploit weaknesses.

200

List of known patterns of attack

signatures

200

An attack...the extra data holds some specific instructions in memory by a cyber-crime or pen-tester to crack the system.

Buffer-overflow

200

How many actions can there be associated with one rule?

One

200

_________ define what users can do in Splunk.

ROLE

200

Who hacks into systems, with permission, to find vulnerabilities and help secure the system?

White hat hacker

300

Best for monitoring critical assets

HIDS

300

...a search box can take at most 200 words, you’ve inserted more/hit search; the system crashes... because of limited

buffer

300

What is referred to as type?

taxonomy

300

Search strings in SPLUNK are sent from the _________.

Search Head

300

Why complete a pen test?

To improve the security of the system.

400

What are three modes of running Snort?

NIDS, sniffer, packet logger mode

400

How many types of buffer-overflow attack are there?

2

400

What does TD do?

Promotes events to alerts

400

Search requests in SPLUNK are processed by the ___________.

Indexers

400

Which pen testing  tool do hackers like to use?

Passive tools

500

Placed in line on network as a TAP

sensors

500

Buffer-overflow may remain as a bug in apps if __________ are not done fully.

boundary checks

500

Threat Evaluator main role is...

Potential answers: 

1.to evaluate an alert and apply risk score 

2.to identify threat level

500

Splunk uses ________ to categorize the type of data being indexed.

Source Type

500

Who does pen testing blind?

Malicious hacker

M
e
n
u