Endpoint Monitoring Flashcards

(40 cards)

1
Q

The practice of observing and analyzing host-level activity for signs of malicious behavior.

A

Endpoint monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security solution that collects real-time data from endpoints and detects suspicious behavior.

A

Endpoint Detection and Response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A basic tool that monitors endpoints for malware using known signatures.

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A centralized platform that manages security policies, agent configurations, and alerting across endpoints.

A

Endpoint security manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logs that record local user logins, process launches, and system changes.

A

Host-based logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Log data that shows which user account started a process and when.

A

Security log (Event ID 4688 in Windows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Suspicious behavior where a script spawns a system process (e.g., PowerShell → cmd.exe).

A

Process chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Endpoint activity indicating persistence via registry modification or startup folder use.

A

Persistence mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An alert triggered when a program tries to access memory used by another program.

A

Memory injection detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Endpoint behavior where malware disables security tools or logging.

A

Defense evasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The file type or artifact that stores logs and events from Windows endpoints.

A

.evtx (Windows Event Log file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tool used to monitor Linux endpoint logs in real time.

A

journalctl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of collecting and analyzing security-relevant artifacts from a single host.

A

Host forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A suspicious event where a non-administrator account gains privileged access.

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Detecting commands such as net user or whoami from scripts on a host.

A

Reconnaissance behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process used to ensure endpoint logs are not tampered with.

A

Log integrity verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Monitoring technique used to detect ransomware encrypting multiple files rapidly.

A

File access anomaly detection

17
Q

Tool used to monitor file changes, hashes, and unauthorized modifications.

A

File Integrity Monitoring (FIM)

18
Q

Endpoint activity showing encoded PowerShell or base64 strings.

A

Obfuscated command execution

19
Q

Suspicious access to C:\Users<user>\AppData\Temp or similar directories may indicate:

A

Malware staging

20
Q

A known clean file altered by an attacker to evade detection.

A

Living off the land (LOLBin)

21
Q

The use of a system tool (like regsvr32.exe) for malicious purposes.

A

Living off the land technique

22
Q

The component responsible for sending endpoint log data to a SIEM.

A

Log forwarder (e.g., Winlogbeat, NXLog)

23
Q

A suspicious pattern of failed login attempts on an endpoint.

A

Brute-force attack

24
Alert showing a rarely used binary executed from a temporary or user directory.
Execution anomaly
25
The tool that collects telemetry across endpoints and creates behavior baselines.
Extended Detection and Response (XDR)
26
Endpoint event showing file encryption followed by ransom note creation.
Ransomware indicator
27
A change in startup programs or scheduled tasks on an endpoint.
Persistence indicator
28
Log entries showing unknown IPs initiating RDP sessions on multiple hosts.
Lateral movement detection
29
A collection of logs, alerts, and telemetry focused on user devices and servers.
Endpoint telemetry
30
A method attackers use to hide in plain sight by renaming tools like cmd.exe to svchost.exe.
Masquerading
31
Use of rare or unsigned executables that do not match a known software baseline.
Application whitelisting violation
32
Threat actor behavior that manipulates registry keys or local group policies.
System configuration tampering
33
A user opening an unusual file type like .scr, .hta, or .vbs from email.
Potential malware execution
34
Endpoint alert triggered by unexpected network traffic from a non-networking process.
Outbound beaconing
35
Executables found in non-standard directories such as %TEMP% or %APPDATA%.
Suspicious file location
36
Monitoring tool that can terminate malicious processes and isolate infected hosts.
EDR response feature
37
The process of reviewing alerts to determine if they are true positives or false positives.
Alert triage
38
An endpoint monitoring control that ensures removable devices are logged or restricted.
Device control policy
39
The endpoint event that may indicate credential dumping activity.
LSASS memory access attempt