1.2 Given a scenario, analyze indicators of potentially malicious activity Flashcards
(7 cards)
Some software installs or updates may modify the Windows ______ to change settings or add new ones, causing ________ anomalies
registry
Implementing network segmentation can prevent _______ movement by attackers and limit their ability to access sensitive data
lateral
Application log
Provides information about the application’s internal functions and operations, including any unauthorized changes.
System log
Logs system events, such as startup and shutdown.
Network mapping creates a ________ representation of the network
visual
What is an irregular communication pattern in which a device sends repeated signals or message a command and control server to establish connection?
Beaconing
Irregular __________ communication between two devices that are not typically in direct contact with each other, and it can indicate later movement of malware between endpoints
peer-to-peer