Acronyms
IDS and IPS Rule Changes
Forensics Tools
Definitions
Monitoring Output Analysis
100

SPAN

Switched port analyzer

100

Text to inform the responder what triggered the rule.

msg

100

Capturing from a network segment can be performed by a _____________

Switched port analyzer
(SPAN) port

100

Protocol analysis

Using statistical tools to analyze a sequence of packets, or packet trace.

100

Which framework assures the most comprehensive spoofing mitigation for email services?

Conformance (DMARC) framework


The Domain-based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) are being utilized effectively.

200

TAP

Test access port

200

Match a new or existing TCP connection, or match regardless of TCP connection state.

flow

200

______ means that a device is inserted in the cabling to copy frames passing over it.

Test access port (TAP)

200

Percent encoding

Allows a user-agent to submit any safe or unsafe character (or binary data) to the server within the URL.

200

On what type of server(s) are spoofing mitigation records for common frameworks published?

DNS servers

300

DGA

Domain generation algorithm

300

Match an entry in an attack database, such as CAPEC or ATT&CK.

reference

300

____ is a command-line packet capture utility for Linux.

Tcpdump

300

Firewalking

A means of determining a router or firewall's ACL and mapping the internal network from the outside, or conversely discovering which outbound port and source address combinations are permitted.

300

Is any other type of server other than SMTP required to implement S/MIME?

Secure/Multipurpose Internet Mail Extensions (S/MIME) requires that the user is issued a digital certificate containing his or her public key, signed by a certificate authority (CA) server.

400

WAF

Web application firewall

400

Apply a rate limiter to the rule by only triggering it if a threshold of events is passed over a particular duration.

track

400

_____ is an open-source graphical packet capture utility, with installer packages for most operating systems.

Wireshark

400

Black hole

Drops traffic before it reaches its intended destination, and without alerting the source.

400

What are the principal techniques for reverse assembling malware code?

The binary machine code can be disassembled to assembly code and potentially decompiled to high-level pseudocode. Another technique is to extract strings from the process image.

500

IDS

Intrusion detection system

500

Give the rule a unique ID and provide version information.

sid and rev

500

_____ refers to deep-down frame-by-frame scrutiny of captured frames using a tool such as Wireshark.

Packet analysis

500

Reverse proxy

Provides for protocol-specific inbound traffic.

500

You suspect that a host is infected with malware but cannot identify a suspect process using locally installed tools. What is your best course of action?

Contain the host within a sandbox for further analysis. The best approach is to monitor the host for outbound network connection attempts. If the host attempts to connect to suspicious domains or IP address ranges, you can identify the process responsible.