SecOps Fundamentals Flashcards

(21 cards)

1
Q

What Is Cortex?

A

Cortex is an artificial-intelligence-based, continuous security platform. Cortex allows organizations to create, deliver, and consume innovative new security products from any provider without additional complexity or infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The goal of any security team

A

is to defend an organization’s infrastructure and data from damage, unauthorized access, and misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cortex XSOAR

A

allows security teams to ingest alerts across multiple sources and then execute automatable playbooks for accelerated incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cortex XSIAM

A

is an artificial intelligence (AI)-powered security operations platform that revolutionizes the way data, analytics, and automation get deployed to outpace modern threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Behavioral Threat Protection LIfecycle

A
  1. Endpoint Attacks Generate Multiple Events
  2. Cortex XDR Executes Policy-Based Action
  3. Cortex XDR prevents Script-based, file-less attacks
  4. Cortex XDR Blocks Ransomeware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the Cortex XDR agent block zero day attacks/

A

By blocking the exploitation techniques that attackers use to manipulate applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Actions available when remediation on the endpoint is needed following an alert or investigation.

A

Isolate Endpoint

Terminate Process

Block Additional Executions

Quarantine Malicoius Files

Retrieve Files

Access Endpoints with Live Terminal

Orchestrate Reponse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 Areas of Focus with XSOAR

A

Workflow Automation

Ticketing

Collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Goals of Cortex XSOAR

A

Accelerated Responses

Collaboration and Learning

Standardized Process

Reduced Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TIM

A

Threat Intelligence Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

XSIAM

A

Extended Security Intelligence and Automation Management

Part EDR, SOAR, as well as Attack Surface Management (ASM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What technology is set to replace SIEM?

A

XSIAM

Extended Security Intelligence and Automation Managment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What four technologies make up Cortex XSIAM?

A

SOAR
EDR
ASM
SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOAR

A

SOAR is a technology designed to centralize and automate routine tasks as well as enrich the work of security analysts by performing mundane tasks as soon as the alert is handled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASM

A

technology is designed to utilize the attacker’s perspective in the discovery, management, identification, and monitoring of an organization’s internet-facing perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SIEM

A

is a technology that has been integrated into security operations for nearly two decades. SIEMs ingest and store logs, normalize them, run rules against the normalized logs, and create alerts based upon preconfigured logic.

17
Q

Which Cortex technology combines multiple methods of prevention at critical phases within the attack lifecycle to halt the execution of malicious programs and stop the exploitation of legitimate applications, regardless of operating system?

18
Q

What is the purpose of using decoy files in the Cortex XDR agent’s behavior-based ransomware protection module?

A

To attract ransomware and analyze its behavior

19
Q

Which three areas of focus can Cortex XSOAR help SecOps teams combat security challenges? (Choose three.)

A

Workflow Automation

Ticketing

Collaboration

20
Q

Which security technology is known for storing, ingesting and normalizing logs and running rules against them?