Analyzing Network IoCs Flashcards

(30 cards)

1
Q

An IP address making regular outbound connections to a known malicious domain.

A

Command and Control (C2) indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multiple DNS requests for domains with random-looking strings.

A

DGA (Domain Generation Algorithm) activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A file hash observed in network traffic that matches a known malware sample.

A

Malicious file IOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Repeated TCP SYN packets sent to sequential ports on the same host.

A

Port scan behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An HTTPS connection to a rare or previously unseen IP during off-hours.

A

Suspicious outbound connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An internal host trying to connect to external SMTP or FTP servers.

A

Data exfiltration attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The same hash being seen in logs across multiple endpoints.

A

Lateral propagation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Repeated 401/403 HTTP responses in web traffic logs.

A

Unauthorized access attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Abnormal volume of DNS queries from a single endpoint.

A

Beaconing indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use of DNS or ICMP traffic for outbound data transmission.

A

Covert channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web traffic from a system to an IP address that doesn’t resolve through DNS.

A

Hardcoded IP usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A single internal host communicating with multiple foreign IP addresses.

A

Botnet behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unusual HTTP user-agent strings in outbound requests.

A

Malware calling home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Detection of TOR traffic or anonymizing proxy use.

A

Obfuscation indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A sudden spike in outbound connections from one host.

A

Potential exfiltration or scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network alerts from known blacklisted domains or IPs.

A

Threat intel match

17
Q

A series of failed connection attempts followed by one successful connection.

A

Brute-force indication

18
Q

A non-DNS service communicating over port 53.

A

DNS tunneling

19
Q

Network pattern showing consistent traffic every 60 seconds to the same IP.

A

Beaconing pattern

20
Q

Traffic pattern suggesting spread to other systems within the same subnet.

A

Lateral movement

21
Q

Network flow logs showing large outbound traffic over non-standard ports.

A

Anomalous port usage

22
Q

High volume of HTTP POST requests to a suspicious domain.

A

Data drop-off point

23
Q

A new executable downloaded from an external IP via HTTP.

A

Payload delivery

24
Q

NetFlow showing unexpected traffic between VLANs.

A

Internal reconnaissance

25
Alerts showing unusual connection times from user devices.
Behavior anomaly
26
Observed traffic using unusual protocols or protocol mismatches.
Protocol abuse
27
Packet captures showing encrypted traffic where plaintext is expected.
Suspicious encryption use
28
An increase in ICMP echo requests from a non-administrative system.
Network scanning attempt
29
SIEM correlation showing similar traffic from multiple infected hosts.
Coordinated attack
30
Identifying IOCs by comparing live traffic to threat intelligence feeds.
IOC correlation