AMP4EP Flashcards

1
Q

File Fetch

A

is used to extract the files so that they can be analyzed by ThreatGrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Interface (API)

A

The API is a set of programmatic interfaces that allow you to access the data and events in your account without logging into the Console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cognitive Threat Analytics (CTA)

A

Records any incidents that occur on computers that don’t have an AMP for Endpoints connector installed.
* Detects/Records breaches by analyzing web traffic from all devices on the network even if they don’t have AMP4EP connector on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Auto Analysis for Low Prevalence

A

Finds rare executables (.exe) that are only on a few machines and submit to TALOS if they look suspicious
* Can submit up to 80 auto and 20 manual (files) per day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Simple Custom Detection List

A

is similar to a blacklist. These are files that you want to detect and quarantine.
* Not only will SCDL quarantine future files, but through Cloud Recall, it will quarantine instances of the file on any EP in your organization that the service has already seen it on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advanced Custom Detection List

A

are like traditional antivirus signatures, but they are written by the user. These signatures can inspect various aspects of a file and have different signature formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exclusion List

A

is a director, file extension, or threat name that you do not want the AMP for EP connector to scan or convict.
* Exclusions can be used to resolve conflicts with other security products or mitigate performance issues by excluding directories containing large files that are written to frequently like databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Device Trajectory

A

Shows activity on computers that have deployed the AMP for Endpoints Connector. It continuously tracks activity and communications on devices and on the system level. This helps you quickly understand root causes and the chronological history of events leading up to and after compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

File Trajectory

A

Shows the complete lifecycle of each file in your environment from the first time it was seen to the last time, as well as all computers in the network that were affected. So, you can get better visibility and reduce the time required to scope a malware breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blacklisting

A

Blocking access to particular known threats or vulnerabilities but also those that are deemed inappropriate within a given organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud Access Security Broker

A

Acts as a gatekeeper, allowing the organization to extend the reach of their security policies beyond their own infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command and Control Callbacks

A

Centralized machines that are able to send commands and receive outputs of machines (part of a botnet). They have the ability to leak data and can be hard to identify on an endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS (Domain Name System)

A

Naming system for computers, services, or other resources connected to the Internet or a private network. It’s responsible for the translation of domain name to their respective IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPS

A

Intrusion Protection System (essentially the “Alarm System” for your network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lightweight connector

A

Means that there is minimal/negligible impact on performance (such as CPU usage).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Micro-applications

A

Small applications (or sub applications of a larger service) designed to extend a defined set of enterprise functionality and transactions that is specific to a user’s role and requirements. (i.e. Chat, send documents).

17
Q

Multi-layered Approach

A

A defensive strategy featuring multiple defensive layers that are designed to slow down an attacker

18
Q

Point in Time

A

Incoming files will be scanned only once

19
Q

Sandboxing

A

Security mechanism for separating running programs. It is often used to test untrusted programs or code.

20
Q

Shadow IT

A

Systems and solutions built and used inside organizations without explicit organizational approval

21
Q

Software defined segmentation

A

Segmenting which applications can “talk” to users, other applications, and to the public internet. Determines what/who can access data across your network, while examining your access (who you are and if you have the permissions to access the data).

22
Q

TALOS

A

The industry-leading threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.

23
Q

Virtual Private Network

A

Encryption that provides secure access to a remote computer over the Internet.

24
Q

Zero Day Attacks

A

A zero-day (also known as zero-hour or 0-day or day zero) vulnerability is an undisclosed computer-software vulnerability that hackers can exploit to adversely affect computer programs, data, additional computers or a network before there is a patch or fix for remediation.