(10) Indicators Of Compromise Definitions_Concepts Flashcards

1
Q

In terms of Indicators of Compromise (IoCs), how can unusual network traffic be difficult t identify?

A

Bad people can mask unusual network behavior by using TLS to mask traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common outbound traffic Indicators of Comprimise (IoC)?

A

Traffic to unexpected locations

Unusual volumes of outbound traffic

DNS queries for unexpected domains or domains flagged as malicious in reputation tools

Outbound traffic at weird times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can resource utilization be an Indicator of Compromise (IoC)?

A

Resource utilization could be an attacker consuming CPU or memory due to tools or utilities, or data can be gathered, which could take up more space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can Unusual Account Behavior be an Indicator of Compromise (IoC)?

A

Unusual Account Behavior can be an indicator in case a user account has been cracked by an adversary. Profiling, baselines, etc. can help identify these behaviors even more easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What specific user account behaviors need to be monitored?

A

Account behaviors such as privileged account behaviors, specifically if those accounts are doing things that they don’t normally do.

Escalation of privileges. New privileges being added should be flagged for monitoring.

Bot like behaviors. If many different commands are being run on a system at a faster rate that humans could run them it can flag as being an issue,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When it comes to user and account behaviors, how can we avoid false positives?

A

We can avoid false positives by being as aware as possible of behaviors that we can expect the user to do based on the situation at hand. It could be a user doing something new or a one off situation, so we want to be careful to not falsely accuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do we need to remember about login and rights usage anomalies?

A

It can be tricky to figure out if there is an issue since VPNs use this type of technology often, but if a user logs in from many different geographic locations within a very short time, it can be an issue, so be sure to investigate it. Proper expectations and full knowledge of VPN proxy server locations help can be helpful in reducing false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do we need to be aware of when trying to identify an (Indicator of Compromise (IoC)?)

A

Sometimes an IoC may look like a specific thing like a DoS attack, when actually it is the result of an exploit or other non-DoS activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DNS amplification attack?

A

DNS amplification is where a bad actor uses DNS resolvers to increase attack volume by sending many small queries that require large responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How have amplification attacks historically been deployed?

A

Amplification attacks have historically used service vulnerabilities that ramped up traffic without needing the service or system to be compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly