- A log is a record of events that occur within an organization’s systems. Log analysis is the process of examining logs to identify events of interest.
- A log and log analysis both contain details of events, but they record details from different sources.
- A log records details in log files. Log analysis involves a high-level overview of all events that happen on the network.
- A log contains log file details. Log analysis involves the collection and storage of logs.
Q: Fill in the blank: A syslog entry contains a header, _____, and a
message.
- structured-data
- tag
- object
- eXtensible Markup Language
Q: What is the difference between a network-based intrusion detection
system (NIDS) and a host-based intrusion detection system (HIDS)?
- Both NIDS and HIDS monitor systems and generate alerts, but a NIDS use agents.
- A NIDS collects and monitors network traffic and network data. A HIDS monitors the activity of the host on which it is installed.
- A NIDS monitors the activity of the host on which it is installed. A HIDS uses signature analysis to analyze network activity.
- A NIDS logs and generates alerts. A HIDS system monitors endpoint activity.
Q: What are examples of common rule actions that can be found in
signature? Select three answers.
- Flow
- Reject
- Pass
- Alert
Q: Which rule option is used to match based on the direction of network
traffic?
- content
- flow
- sid
- message
Q: What is the difference between network telemetry and network alert
logs?
- Network telemetry is output in EVE JSON format; network alert logs are output in HTML.
- Both provide information that is relevant for security analysts, but network alert logs contain network connection details.
- Network telemetry contains information about network traffic flows; network alert logs are the output of a signature.
- Network telemetry is the output of a signature; network alert logs contain details about malicious activity.
Q: Fill in the blank: The asterisk symbol is also known as a(n) _____.
- label
- option
- wildcard
- Boolean operator
Q: Which step in the SIEM process involves the processing of raw data
into a standardized and structured format?
- Index
- Normalize
- Collect
- Process
Q: Examine the following log:
{
“name”:
“System test”,
“host”:
"167.155.183.139",
“id”:
11111,
“Message”:
[error] test,
}
Which log format is this log entry in?
- JSON
- Syslog
- XML
- CSV
Q: Fill in the blank: _____ analysis is a detection method used to find
events of interest using patterns.
- Host
- Network
- Endpoint
- Signature
Q: Which rule option is used to indicate the number of times a
signature is updated?
- sid
- rev
- msg
- tcp
Q: Which type of log data does Suricata generate? Select all that
apply.
- Protocol
- Alert
- Signature
- Network telemetry
Q: Fill in the blank: Chronicle uses ______ to define detection rules.
- SPL
- SQL
- YARA-L
- UDM
Q: What are the steps in the SIEM process for data collection? Select
three answers.
- Index
- Collect
- Unify
- Normalize
Q: Examine the following log:
[2022/12/21 17:46:35.232748] NOTIFY: NetworkPropertiesUpdated:
wifi_psk_13
Which type of log is this?
- Location
- Application
- Network
- Authentication
Q: What information is included in a signature’s header? Select all
that apply.
- IP address
- Action
- Port number
- Protocol
Q: Examine this Suricata signature:
alert http 167.215.72.95 any -> 156.150.71.141 80 (msg:”GET on wire”;
flow:established,to_server; content:”GET”; sid:12345; rev:2;)
What is the destination port?
- 80
- 2
- 141
- 12345
Q: Fill in the blank: Suricata uses the _____ format for event and
alert output.
- HTML
- HTTP
- CEF
- EVE JSON
Q: Which querying language does Splunk use?
- Structured Processing Language
- SIEM Processing Language
- Search Processing Language
- Structured Querying Language
Q: Which of the following refers to a record of events that occur
within an organization’s systems?
- Occurrences
- Logs
- Log sources
- Log forwarder