100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SANS 511 - Book 5 UPDATED Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
17-01-2025
Written in
2024/2025

SANS 511 - Book 5 UPDATED Exam Questions and CORRECT Answers Continuous Security Monitoring (CSM) - CORRECT ANSWER - Data at rest. Log files, registry keys, system configuration and so on. CSM is primarily vulnerability focused and focuses on data at rest. Log files and registry keys. Network Security Monitoring (NSM) - CORRECT ANSWER - Data (in motion): Packets, and data derived from packets, such as flow

Show more Read less
Institution
SANS
Course
SANS









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS
Course
SANS

Document information

Uploaded on
January 17, 2025
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS 511 - Book 5 UPDATED Exam
Questions and CORRECT Answers
Continuous Security Monitoring (CSM) - CORRECT ANSWER - Data at rest. Log files,
registry keys, system configuration and so on. CSM is primarily vulnerability focused and
focuses on data at rest. Log files and registry keys.


Network Security Monitoring (NSM) - CORRECT ANSWER - Data (in motion): Packets,
and data derived from packets, such as flow.


DoD Risk Management Framework - CORRECT ANSWER - 1. Categorize Information
Systems, 2. Select Security Controls, 3. Implement Security Controls, 4. Assess Security
Controls, 5. Authorize Information System, 6 Monitor Security Controls


Winning CSM Techniques - CORRECT ANSWER - Build a defensible network, focus on
critical data and systems, detect important changes, solve problems when they are discovered,
focus on high-value events, when faced with large amounts of data, focus on the outliers.


How to protect confidential data? - CORRECT ANSWER - Application whitelisting,
HIPS, dual-factor authentication


Windows server 2008r2 File Classification System (FCI) - CORRECT ANSWER - FCI
does not encrypt files, it simply labels them. Labels are stored in Alternate Data Streams (ADS),
which can be trivially removed.


Azure Information Protection (AIP) - CORRECT ANSWER - Superior to FCI. A random
symmetric AES key can be generated for each file, and then encrypted with the organization's
public key. The document is also signed with the user's private key so labels cannot be removed
or altered without detection.


Change requests - CORRECT ANSWER - Multiple small change requests tend to work
better than one large request.

, Long-tail analysis - CORRECT ANSWER - Long-tail analysis focuses on the leas frequent
occurrences. Allows analysis of large amounts of data without drowning. This approach works
well with Windows Event logs, Installed Software, Startup registry keys and DNS logs.


Long-Tail WEF - CORRECT ANSWER - Key migration operation, A member was added
to a security enabled global group, a user account was enabled, a user account was created, a
member was removed from a security-enabled global group, a user account was deleted


Software inventory is - CORRECT ANSWER - Critical for whitelisting. Know thy
software


Inventory for network assets - CORRECT ANSWER - DHCP logs, Switch CAM tables,
Active scanning, passive scanning, existing inventory database, purchasing data


Active Scanning - CORRECT ANSWER - Active scanning involves scanning a network to
discover connected systems. (includes Nmap). Many SNMP based system monitoring tools
include network discovery modes. Always get permission before performing any type of
scanning or sniffing. (in writing)


Before running active scans, always - CORRECT ANSWER - Always test scans before
running on production system. It is much safer to initially scan development systems. ensure all
active scanning occurs during an approved maintenance window. Begin scanning a limited
amount of systems and gradually increase the scope.


Nmap - CORRECT ANSWER - Active scanning tool. It began as a port scanner, but has
evolved into more. Nmap now provides OS and host detection. Nmap scripting engine (NSE)
extends Nmap's functionality to vuln scanning and even some lightweight exploitation.


Ndiff - CORRECT ANSWER - Nmap include a great asset inventory tool called ndiff.
Compares two scans and reports differences.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1074
Member since
1 year
Number of followers
102
Documents
68976
Last sold
1 day ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

170 reviews

5
73
4
30
3
45
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions