MITRE D3FEND – Flashcards

(50 cards)

1
Q

What is MITRE D3FEND?

A

A framework that describes defensive techniques to counter known adversary behaviors documented in MITRE ATT&CK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main goal of D3FEND?

A

To standardize and document cyber defense techniques against real-world threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of model is D3FEND based on?

A

A knowledge graph model that shows relationships between defense techniques and threat behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does D3FEND complement MITRE ATT&CK?

A

D3FEND maps defensive capabilities directly to the offensive techniques in ATT&CK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name a major category in D3FEND techniques.

A

Harden, Detect, Deceive, Evict, or Isolate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What category focuses on prevention measures like patching and configuration?

A

Harden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What category includes methods like logging and monitoring?

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the “Deceive” category in D3FEND involve?

A

Using techniques like honeypots and decoy credentials to mislead attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which category includes stopping or removing adversaries from systems?

A

Evict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which D3FEND category involves segmenting systems to prevent attacker movement?

A

Isolate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is “Credential Hash Storage Protection”?

A

A D3FEND hardening technique that protects against credential theft (e.g., LSASS memory dumps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “Process Argument Analysis”?

A

A detection technique analyzing command-line arguments for malicious patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is “Network Traffic Analysis”?

A

A detection technique that monitors network data to detect anomalies or C2 traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is “Executable Allowlisting”?

A

A hardening technique that allows only trusted applications to run on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does “Decoy File” mean in D3FEND?

A

A file placed intentionally to detect or mislead attackers when accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is “DNS Traffic Analysis”?

A

A detection technique that analyzes DNS queries to uncover potential command-and-control activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is “Host-Based Firewall Rules”?

A

A hardening technique involving custom firewall configurations at the host level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is “Memory Access Pattern Analysis”?

A

Detecting malicious behavior by analyzing how memory is accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is “Software Update”?

A

A hardening measure to prevent exploitation of known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which ATT&CK technique can be countered by D3FEND’s “Multi-Factor Authentication”?

A

Valid Accounts (T1078).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What ATT&CK technique is countered by “Executable Allowlisting”?

A

Scripting / Command and Scripting Interpreter (T1059).

22
Q

Which D3FEND technique helps detect lateral movement using PsExec?

A

Process Creation Analysis and Network Connection Monitoring.

23
Q

What D3FEND technique counters LSASS dumping?

A

Credential Hash Storage Protection.

24
Q

What technique in D3FEND can help detect phishing payloads?

A

Attachment Inspection and Email Behavior Analysis.

25
What defense technique can be used to identify brute-force login attempts?
Authentication Log Analysis.
26
What technique helps in detecting beaconing activity?
Network Traffic Flow Analysis.
27
What does “Deceptive Environment” refer to?
A controlled trap environment (e.g., honeynet) that lures attackers for analysis.
28
How can “Session Termination” be used defensively?
To disconnect malicious sessions once detected (Evict category).
29
How is D3FEND useful in building defense-in-depth strategies?
It offers layered defensive options mapped directly to known attack techniques for comprehensive security.
30
What is Decoy Credentials in D3FEND used for?
To trick adversaries into using fake credentials, which can trigger alerts when used.
31
What does Application Layer Filtering help defend against?
Malicious web traffic and application exploits by filtering content at the application layer.
32
What is the goal of Filesystem Monitoring?
To detect unauthorized or abnormal changes to files or directories.
33
What is Packet Inspection in a D3FEND context?
Examining packet contents for signatures of malicious behavior or policy violations.
34
What is Process Chain Analysis used for?
To trace parent-child relationships between processes to spot unusual or malicious behavior.
35
What is Decoy System in D3FEND?
A honeypot or sandbox system designed to attract attackers and observe their behavior.
36
What is the purpose of Dynamic Analysis?
To observe the behavior of files, binaries, or scripts during execution in a controlled environment.
37
What D3FEND technique involves tracking endpoint actions in real time?
Endpoint Telemetry.
38
What is Log Aggregation?
Centralizing logs from multiple sources to simplify analysis and correlation.
39
What technique analyzes the size, timing, and flow of network traffic?
Traffic Flow Analysis.
40
What is Integrity Monitoring?
Checking for unauthorized or unexpected changes to system files, configurations, or software.
41
What technique can detect abuse of remote access software?
Remote Access Monitoring.
42
What D3FEND technique helps in detecting credential reuse or brute force attacks?
Credential Use Monitoring.
43
What is DNS Sinkholing?
Redirecting malicious DNS requests to a non-routable address to prevent C2 communication.
44
What D3FEND technique can alert when USB devices are connected to hosts?
Device Connection Monitoring.
45
What is the goal of Patch Management in D3FEND?
To fix known vulnerabilities and reduce attack surface.
46
What is System Call Monitoring used for?
Detecting low-level OS interactions that may indicate exploitation or malware activity.
47
What is Executable Metadata Analysis?
Reviewing properties of executables (like hashes, names, certificates) for threat indicators.
48
What does Decoy Network Artifact refer to?
Fictitious hostnames, IPs, or services created to lure and detect attacker scans.
49
How does Protocol Decoding help defenders?
By translating raw network traffic into human-readable form to analyze for anomalies.
50
What is Decoy User Account in D3FEND?
A fake user account used to attract and detect unauthorized login attempts.