Indicators of Compromise Flashcards

1
Q

Indicators or signs that unauthorized activity has compromised an information system

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IOCs act as breadcrumbs for

A

incident response investigators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IOCs symptoms can sometimes be exhibited due to

A

technical issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unusual outbound

A

network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anomalies in

A

privileged user account activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Geographical irregularities in

A

network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

account login

A

Red flags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Database read volume

A

Increas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Large number of requests

A

for same files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mismatched port-application traffic

A

encrypted traffic over plain ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Suspicious registry or

A

system file changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unusual DNS

A

Requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unexpected system

A

patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile device

A

profile changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bundles of data in

A

wrong places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web traffic with non-human

A

behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Signs of DDoS attempts

A

even if temporary

18
Q

Framework created by Mandiant and is opensource

A

OpenIOC

19
Q

Structured Threat Information Expression

A

STIX

20
Q

Trusted Automated Exchange of Indicatior Information

A

TAXII

21
Q

Cyber Observable Expression

A

CybOX

22
Q

Designed by MITRE specifically to facilitate automated information sharing between organizations

A

STIX/TAXII/CybOx

23
Q

Piece of software designed to do something nefarious

A

Malware

24
Q

Malware that changes its code after each use, making each replication different for detection purposes.

A

Polymorphic Malware

25
Q

Piece of malicious code that replicates by attaching itself to another piece of executable code

A

Virus

26
Q

Most viruses found are dissected by reverse engineering to understand what they’re doing, where they come from and these viruses aim to stop these efforts

A

Armored Viruses

27
Q

The early beginning of ransomware, that aims to create a DoS by encrypting certain files

A

Crypto-malware

28
Q

Encrypts files though automated means that the attacker uses to demand ransom in exchange for encryption keys

A

Ransomware

29
Q

Malware that once on a network can traverse and spread independently

A

Worm

30
Q

Depends on another piece of code to execute

A

Virus

31
Q

Can replicate and execute on its own

A

Worm

32
Q

Program that charades with one characterisitc or functionality but has another nefarious purpose

A

Trojan

33
Q

Form of malware designed specifically to modify operations of the OS to facilitate non-standard functionality

A

Rootkit

34
Q

SW that logs every keystroke of an end user

A

Keylogger

35
Q

Sw supported by advertising.

A

Adware

36
Q

Malware that spies on user activity and reports stolen information

A

Spyware

37
Q

Piece of sw that performs tasks under the control of another program

A

Bots

38
Q

Toolkit designed to gain unauthorized access to the targeted system

A

Remote-Access Trojan (RAT)

39
Q

Deliberately installed piece of software that sits dormant until some event that triggers malicious payload

A

Logic Bomb

40
Q

After gaining unauthorized access to a system, some attackers will install what’s knonw as a backdoor.

A

Backdoor

Means to esure they gain entry if initial access was discovered.