lab 24 Flashcards

1
Q

What are the Technique(s) reference codes for a logon failure event? (Select two)

T1078
T5309
T1531
T1507

A

T1078
T1531

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the description for the security alert for the clearing of the Application and System logs?

The audit log was cleared
A Windows log file was cleared
Event viewer logs were cleared
A log file was cleared

A

The audit log was cleared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What sources can be used by wazuh to detect suspicious activity? (Select all that apply)

OS logs
application logs
network equipment logs
cloud logs

A

OS logs
application logs
network equipment logs
cloud logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What was the MITRE ATT&CK tactic identified by wazuh related to the deletion of an audit log?

Persistence
Privilege Escalation
Lateral Movement
Defense Evasion

A

Defense Evasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The phase of an Incident Response Plan that creates a record of events or notifies the security personnel about violations is?

Analysis
Detection
Eradication
Containment

A

Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Once the security team is made aware of a potentially violating incident, what is the next phase in Incident Response?

Preperation
Analysis
Eradication
Recovery
Lessons learned

A

Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Potential signs of security breaches or malicious activities within an IT infrastructure are known as?

IoCs (Indicators of Compromise)
Event records
False positives
Registry values

A

IoCs (Indicators of Compromise)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly