CramX Logo
Back to FlashcardsInformation Technology / CompTIA Security+ (SY0-601): Monitoring & Auditing

CompTIA Security+ (SY0-601): Monitoring & Auditing

Information Technology20 CardsCreated 9 months ago

This section explores different types of monitoring—signature-based, anomaly-based, and behavior-based—as well as essential concepts like baselining system performance and understanding how protocol analyzers operate in promiscuous versus non-promiscuous modes for traffic analysis.

Report

Monitoring Types

Signature-based
Network traffic is analyzed for predetermined attack patterns

Anomaly-based
A baseline is established and any network traffic that is outside of the baseline is evaluated

Behavior-based
Activity is evaluated based on the previous behavior of applications, executables, and the operating system in comparison to the current activity of the system

Rate to track your progress ✦

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/20

Key Terms

Term
Definition

Monitoring Types

Signature-based
Network traffic is analyzed for predetermined attack patterns

Anomal...

Baselining

Process of measuring changes in networking, hardware, software, and applications

Perfmo...

Security Posture

Risk level to which a system or other technology element is exposed

Protocol Analyzers: Promiscuous Mode

Network adapter is able to capture all of the packets on the network, regardless of the destination MAC address of the f...

Protocol Analyzers: Non-promiscuous Mode

Network adapter can only capture the packets directly addressed to itself

SNMP: Agents

Software that is loaded on a managed device to redirect information to the network management system