Analyzing Network IoCs Flashcards

1
Q

An IP address making regular outbound connections to a known malicious domain.

A

Command and Control (C2) indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multiple DNS requests for domains with random-looking strings.

A

DGA (Domain Generation Algorithm) activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A file hash observed in network traffic that matches a known malware sample.

A

Malicious file IOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Repeated TCP SYN packets sent to sequential ports on the same host.

A

Port scan behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An HTTPS connection to a rare or previously unseen IP during off-hours.

A

Suspicious outbound connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An internal host trying to connect to external SMTP or FTP servers.

A

Data exfiltration attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The same hash being seen in logs across multiple endpoints.

A

Lateral propagation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Repeated 401/403 HTTP responses in web traffic logs.

A

Unauthorized access attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Abnormal volume of DNS queries from a single endpoint.

A

Beaconing indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use of DNS or ICMP traffic for outbound data transmission.

A

Covert channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web traffic from a system to an IP address that doesn’t resolve through DNS.

A

Hardcoded IP usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A single internal host communicating with multiple foreign IP addresses.

A

Botnet behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unusual HTTP user-agent strings in outbound requests.

A

Malware calling home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Detection of TOR traffic or anonymizing proxy use.

A

Obfuscation indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A sudden spike in outbound connections from one host.

A

Potential exfiltration or scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network alerts from known blacklisted domains or IPs.

A

Threat intel match

17
Q

A series of failed connection attempts followed by one successful connection.

A

Brute-force indication

18
Q

A non-DNS service communicating over port 53.

A

DNS tunneling

19
Q

Network pattern showing consistent traffic every 60 seconds to the same IP.

A

Beaconing pattern

20
Q

Traffic pattern suggesting spread to other systems within the same subnet.

A

Lateral movement

21
Q

Network flow logs showing large outbound traffic over non-standard ports.

A

Anomalous port usage

22
Q

High volume of HTTP POST requests to a suspicious domain.

A

Data drop-off point

23
Q

A new executable downloaded from an external IP via HTTP.

A

Payload delivery

24
Q

NetFlow showing unexpected traffic between VLANs.

A

Internal reconnaissance

25
Q

Alerts showing unusual connection times from user devices.

A

Behavior anomaly

26
Q

Observed traffic using unusual protocols or protocol mismatches.

A

Protocol abuse

27
Q

Packet captures showing encrypted traffic where plaintext is expected.

A

Suspicious encryption use

28
Q

An increase in ICMP echo requests from a non-administrative system.

A

Network scanning attempt

29
Q

SIEM correlation showing similar traffic from multiple infected hosts.

A

Coordinated attack

30
Q

Identifying IOCs by comparing live traffic to threat intelligence feeds.

A

IOC correlation