Indicators of Compromise Flashcards

(40 cards)

1
Q

Indicators or signs that unauthorized activity has compromised an information system

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IOCs act as breadcrumbs for

A

incident response investigators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IOCs symptoms can sometimes be exhibited due to

A

technical issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unusual outbound

A

network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anomalies in

A

privileged user account activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Geographical irregularities in

A

network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

account login

A

Red flags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Database read volume

A

Increas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Large number of requests

A

for same files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mismatched port-application traffic

A

encrypted traffic over plain ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Suspicious registry or

A

system file changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unusual DNS

A

Requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unexpected system

A

patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile device

A

profile changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bundles of data in

A

wrong places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web traffic with non-human

A

behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Signs of DDoS attempts

A

even if temporary

18
Q

Framework created by Mandiant and is opensource

19
Q

Structured Threat Information Expression

20
Q

Trusted Automated Exchange of Indicatior Information

21
Q

Cyber Observable Expression

22
Q

Designed by MITRE specifically to facilitate automated information sharing between organizations

A

STIX/TAXII/CybOx

23
Q

Piece of software designed to do something nefarious

24
Q

Malware that changes its code after each use, making each replication different for detection purposes.

A

Polymorphic Malware

25
Piece of malicious code that replicates by attaching itself to another piece of executable code
Virus
26
Most viruses found are dissected by reverse engineering to understand what they're doing, where they come from and these viruses aim to stop these efforts
Armored Viruses
27
The early beginning of ransomware, that aims to create a DoS by encrypting certain files
Crypto-malware
28
Encrypts files though automated means that the attacker uses to demand ransom in exchange for encryption keys
Ransomware
29
Malware that once on a network can traverse and spread independently
Worm
30
Depends on another piece of code to execute
Virus
31
Can replicate and execute on its own
Worm
32
Program that charades with one characterisitc or functionality but has another nefarious purpose
Trojan
33
Form of malware designed specifically to modify operations of the OS to facilitate non-standard functionality
Rootkit
34
SW that logs every keystroke of an end user
Keylogger
35
Sw supported by advertising.
Adware
36
Malware that spies on user activity and reports stolen information
Spyware
37
Piece of sw that performs tasks under the control of another program
Bots
38
Toolkit designed to gain unauthorized access to the targeted system
Remote-Access Trojan (RAT)
39
Deliberately installed piece of software that sits dormant until some event that triggers malicious payload
Logic Bomb
40
After gaining unauthorized access to a system, some attackers will install what's knonw as a backdoor.
Backdoor Means to esure they gain entry if initial access was discovered.