• Post author:
  • Post category:Blog
  • Reading time:3 mins read
  • Post last modified:June 12, 2024

Match the data event to its best description.

  • can include the 5-tuple information, which is the source and destination IP addresses, source and destination ports, protocols involved with the IP flows ==> NetFlow records
  • can include session information about the connection events that are maintained by using the state table ==> firewall logs
  • triggered based on a signature or rule matching the traffic ==> IPS alerts
  • typically include email and web traffic ==> proxy logs
  • can identify which users have successfully accessed the network or failed to authenticate to access the network ==> identity and access management logs
Explanation & Hint:

To match each data event to its best description:

  1. NetFlow records:
    • Can include the 5-tuple information, which is the source and destination IP addresses, source and destination ports, protocols involved with the IP flows.
    • NetFlow records are used for capturing information about network flows, and the 5-tuple is a fundamental part of this data, representing the basic elements of a network connection.
  2. Firewall logs:
    • Can include session information about the connection events that are maintained by using the state table.
    • Firewalls track and log sessions and decisions made about those sessions (allowed, blocked, etc.), often based on the state of the connection.
  3. IPS alerts:
    • Triggered based on a signature or rule matching the traffic.
    • Intrusion Prevention Systems (IPS) generate alerts when network traffic matches known signatures or rules indicating potentially malicious activity.
  4. Proxy logs:
    • Typically include email and web traffic.
    • Proxies, especially web proxies, log web and email traffic that passes through them, including requests and responses.
  5. Identity and Access Management logs:
    • Can identify which users have successfully accessed the network or failed to authenticate to access the network.
    • These logs track authentication and authorization activities, including successful and failed login attempts.

For more Questions and Answers:

Threat Investigation Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments