Security Information and Event Management Deployment
Definitions
Options to modify the behavior of grep
Misc
String Search and Piping Commands
100

____ is one of the market-leading big data information gathering and analysis tools. It can import machine-generated data via a connector or visibility add-on.

Splunk

100

Behavior-based detection

Means that the engine is trained to recognize baseline traffic or expected events associated with a user account or network device.

100

By default, literal search strings in grep are case-sensitive. This option ignores case sensitivity.

-i

100

True or false? Syslog uses a standard format for all message content.

False—syslog messages have a PRI code, header, and message structure, but the format of messages is application-specific.

100

____ matches zero or more times (quantifier).

*

200

_____ is an open-source SIEM with an enterprise version focused on compliance and supporting IT operations and DevOps.

Graylog

200

Trend analysis

The process of detecting patterns within a dataset over time and using those patterns to make predictions about future events.

200

Returns the total count of matching lines rather than the lines themselves.

-c

200

Which two factors do you need to account for when correlating an event timeline using a SIEM?

First, you need to validate that all log sources were synchronized to the same time source. Second, you need to account for any variations in time zone for the different sources.    

200

_____ matches the start of a line only (anchor/boundary).

^

300

_____ is IBM's SIEM log management, analytics, and compliance reporting platform.

QRader

300

Anomaly analysis

The process of defining an expected outcome or pattern to events, and then identifying any events that do not follow these patterns.

300

Reverses the command's default be-havior, returning only lines that do not match the given string.

-v

300

What type of visualization is most suitable for identifying traffic spikes?

A line graph is a good way of showing changes in volume over time.

300

____matches a single instance of a character within the brackets. This can include literals, ranges such as [a-z], and token matches, such as [\s] (white space) or [\d] (one digit).

[ ... ]

400

______ is a vendor of SIEM log management and analytics software, now owned by HP, via the affiliated company Micro Focus.

ArcSight

400

Regular expression

A search pattern to match within a given string. The search pattern is built from the regex syntax.

400

Returns the names of the files with matching lines rather than the lines themselves. Primarily used in multi-file grep searches.

-l

400

Which default port do you need to allow on any internal firewalls to allow a host to send messages by syslog to a SIEM management server?

The default port for syslog is UDP 514. If the syslog implementation is using reliable delivery, the default TCP port is 1468.    

400

_____ matches one or more occurrences (quantifier). A quantifier is placed after the term to match; for example, \s+ matches one or more white space characters.

+

500

______ is a SIEM product developed by Alien Vault, who market commercial versions of it.

Open-Source Security Information Management

500

Heuristic Analysis

    

Means the software can use techniques to determine whether a set of data points are similar enough to "IF x AND (y OR z)" that an alert should be generated anyway.

500

Treats literal search strings as discrete words. By default, the string add will also return address. With this option, the string add will only return instances of the word add by itself.

-w

500

What options are there for ingesting data from a unified threat management (UTM) appliance deployed on the network edge to a SIEM?

If supported, you could deploy agent software to the UTM. In the latter case, you will still need to use a filter to parse and normalize the logs. Most SIEMs come with filters for the major appliance platforms, but if not supported directly, you will need to configure a custom filter.

500

____ defines a matching group, with a regex sequence placed within the parentheses. Each group can subsequently be referred to by \1 for the first group, \2 for the second, and so on.

( ... )

M
e
n
u