Home > Articles

Summarizing the Techniques Used in Security Assessments

In this sample chapter from CompTIA Security+ SY0-601 Cert Guide, 5th Edition, you will learn how the threat-hunting process leverages threat intelligence.

This chapter is from the book

This chapter covers the following topics related to Objective 1.7 (Summarize the techniques used in security assessments) of the CompTIA Security+ SY0-601 certification exam:

  • Threat hunting

    • Intelligence fusion

    • Threat feeds

    • Advisories and bulletins

    • Maneuver

  • Vulnerability scans

    • False positives

    • False negatives

    • Log reviews

    • Credentialed vs. non-credentialed

    • Intrusive vs. non-intrusive

    • Application

    • Web application

    • Network

    • Common Vulnerabilities and Exposures (CVE) and Common Vulnerability Scoring System (CVSS)

    • Configuration review

  • Syslog/Security information and event management (SIEM)

    • Review reports

    • Packet capture

    • Data inputs

    • User behavior analysis

    • Sentiment analysis

    • Security monitoring

    • Log aggregation

    • Log collectors

  • Security orchestration, automation, and response (SOAR)

This chapter starts by introducing threat hunting and how the threat-hunting process leverages threat intelligence. Then you learn about vulnerability management tasks, such as keeping up with security advisories and performing vulnerability scans. You also learn about the importance of collecting logs (such as system logs [syslogs]) and analyzing those logs in a Security Information and Event Management (SIEM) system. In addition, you learn how security tools and solutions have evolved to provide Security Orchestration, Automation, and Response (SOAR) capabilities to better defend your network, your users, and your organizations overall.

“Do I Know This Already?” Quiz

The “Do I Know This Already?” quiz enables you to assess whether you should read this entire chapter thoroughly or jump to the “Chapter Review Activities” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read the entire chapter. Table 7-1 lists the major headings in this chapter and their corresponding “Do I Know This Already?” quiz questions. You can find the answers in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes and Review Questions.”

Table 7-1 “Do I Know This Already?” Section-to-Question Mapping

Foundation Topics Section

Questions

Threat Hunting

1–3

Vulnerability Scans

4–6

Syslog and Security Information and Event Management (SIEM)

7–8

Security Orchestration, Automation, and Response (SOAR)

9–10

  1. What is the act of proactively and iteratively looking for threats in your organization that may have bypassed your security controls and monitoring capabilities?

    1. Threat intelligence

    2. Threat hunting

    3. Threat binding

    4. None of these answers are correct.

  2. Which of the following provides a matrix of adversary tactics, techniques, and procedures that modern attackers use?

    1. ATT&CK

    2. CVSS

    3. CVE

    4. All of these answers are correct.

  3. Which identifier is assigned to disclosed vulnerabilities?

    1. CVE

    2. CVSS

    3. ATT&CK

    4. TTP

  4. Which broad term describes a situation in which a security device triggers an alarm, but no malicious activity or actual attack is taking place?

    1. False negative

    2. True negative

    3. False positive

    4. True positive

  5. Which of the following is a successful identification of a security attack or a malicious event?

    1. True positive

    2. True negative

    3. False positive

    4. False negative

  6. Which of the following occurs when a vulnerability scanner logs in to the targeted system to perform deep analysis of the operating system, running applications, and security misconfigurations?

    1. Credentialed scan

    2. Application scan

    3. Noncredentialed scan

    4. None of these answers are correct.

  7. Which of the following are functions of a SIEM?

    1. Log collection

    2. Log normalization

    3. Log correlation

    4. All of these answers are correct.

  8. Which solution allows security analysts to collect network traffic metadata?

    1. NetFlow

    2. SIEM

    3. SOAR

    4. None of these answers are correct.

  9. Which solution provides capabilities that extend beyond traditional SIEMs?

    1. SOAR

    2. CVSS

    3. CVE

    4. IPFIX

  10. Which of the following can be capabilities and benefits of a SOAR solution?

    1. Automated vulnerability assessment

    2. SOC playbooks and runbook automation

    3. Orchestration of multiple SOC tools

    4. All of these answers are correct.

vceplus-200-125    | boson-200-125    | training-cissp    | actualtests-cissp    | techexams-cissp    | gratisexams-300-075    | pearsonitcertification-210-260    | examsboost-210-260    | examsforall-210-260    | dumps4free-210-260    | reddit-210-260    | cisexams-352-001    | itexamfox-352-001    | passguaranteed-352-001    | passeasily-352-001    | freeccnastudyguide-200-120    | gocertify-200-120    | passcerty-200-120    | certifyguide-70-980    | dumpscollection-70-980    | examcollection-70-534    | cbtnuggets-210-065    | examfiles-400-051    | passitdump-400-051    | pearsonitcertification-70-462    | anderseide-70-347    | thomas-70-533    | research-1V0-605    | topix-102-400    | certdepot-EX200    | pearsonit-640-916    | itproguru-70-533    | reddit-100-105    | channel9-70-346    | anderseide-70-346    | theiia-IIA-CIA-PART3    | certificationHP-hp0-s41    | pearsonitcertification-640-916    | anderMicrosoft-70-534    | cathMicrosoft-70-462    | examcollection-cca-500    | techexams-gcih    | mslearn-70-346    | measureup-70-486    | pass4sure-hp0-s41    | iiba-640-916    | itsecurity-sscp    | cbtnuggets-300-320    | blogged-70-486    | pass4sure-IIA-CIA-PART1    | cbtnuggets-100-101    | developerhandbook-70-486    | lpicisco-101    | mylearn-1V0-605    | tomsitpro-cism    | gnosis-101    | channel9Mic-70-534    | ipass-IIA-CIA-PART1    | forcerts-70-417    | tests-sy0-401    | ipasstheciaexam-IIA-CIA-PART3    | mostcisco-300-135    | buildazure-70-533    | cloudera-cca-500    | pdf4cert-2v0-621    | f5cisco-101    | gocertify-1z0-062    | quora-640-916    | micrcosoft-70-480    | brain2pass-70-417    | examcompass-sy0-401    | global-EX200    | iassc-ICGB    | vceplus-300-115    | quizlet-810-403    | cbtnuggets-70-697    | educationOracle-1Z0-434    | channel9-70-534    | officialcerts-400-051    | examsboost-IIA-CIA-PART1    | networktut-300-135    | teststarter-300-206    | pluralsight-70-486    | coding-70-486    | freeccna-100-101    | digitaltut-300-101    | iiba-CBAP    | virtuallymikebrown-640-916    | isaca-cism    | whizlabs-pmp    | techexams-70-980    | ciscopress-300-115    | techtarget-cism    | pearsonitcertification-300-070    | testking-2v0-621    | isacaNew-cism    | simplilearn-pmi-rmp    | simplilearn-pmp    | educationOracle-1z0-809    | education-1z0-809    | teachertube-1Z0-434    | villanovau-CBAP    | quora-300-206    | certifyguide-300-208    | cbtnuggets-100-105    | flydumps-70-417    | gratisexams-1V0-605    | ituonline-1z0-062    | techexams-cas-002    | simplilearn-70-534    | pluralsight-70-697    | theiia-IIA-CIA-PART1    | itexamtips-400-051    | pearsonitcertification-EX200    | pluralsight-70-480    | learn-hp0-s42    | giac-gpen    | mindhub-102-400    | coursesmsu-CBAP    | examsforall-2v0-621    | developerhandbook-70-487    | root-EX200    | coderanch-1z0-809    | getfreedumps-1z0-062    | comptia-cas-002    | quora-1z0-809    | boson-300-135    | killtest-2v0-621    | learncia-IIA-CIA-PART3    | computer-gcih    | universitycloudera-cca-500    | itexamrun-70-410    | certificationHPv2-hp0-s41    | certskills-100-105    | skipitnow-70-417    | gocertify-sy0-401    | prep4sure-70-417    | simplilearn-cisa    |
http://www.pmsas.pr.gov.br/wp-content/    | http://www.pmsas.pr.gov.br/wp-content/    |