1.2 Given a scenario, analyze indicators of potentially malicious activity Flashcards

(7 cards)

1
Q

Some software installs or updates may modify the Windows ______ to change settings or add new ones, causing ________ anomalies

A

registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Implementing network segmentation can prevent _______ movement by attackers and limit their ability to access sensitive data

A

lateral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application log

A

Provides information about the application’s internal functions and operations, including any unauthorized changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

System log

A

Logs system events, such as startup and shutdown.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network mapping creates a ________ representation of the network

A

visual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an irregular communication pattern in which a device sends repeated signals or message a command and control server to establish connection?

A

Beaconing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Irregular __________ communication between two devices that are not typically in direct contact with each other, and it can indicate later movement of malware between endpoints

A

peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly