CH 11 Flashcards

1
Q

tools primarily focused on detecting and investigating
suspicious activities (and traces of such) other problems on hosts/endpoints

A

Endpoint Detection and Response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The AMP cloud is able to provide a historical view of malware activity, segmented into two
activity types:

A

File trajectory and device trajectory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

allows you to create lists that customize AMP for Endpoints to your
organization’s needs.

A

Outbreak Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The custom detections used for outbreak control can also be used to prevent users from installing application unwanted by the organization, this is referred to as?

A

Application Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can you use to define IPv4 addresses that should not be blocked or flagged by
DFC (device flow correlation).

A

IP Whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do you use to create DFC detections?

A

IP Blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a list of directories, file extensions, or even
threat names that you do not want the AMP agent to scan and subsequently not convict as
malware

A

Exclusion Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the 4 available exclusion types

A

Threat, Extension, Wildcard, Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the three detection and protection “engines” in AMP for Endpoints

A

TETRA, Spero, Ethos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A full client-side antivirus solution which is disabled by default

A

TETRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A machine learning–based technology that proactively identifies threats that
were previously unknown. It uses active heuristics to gather execution attributes, and
because the underlying algorithms come up with generic models, they can identify
malicious software based on its general appearance rather than basing identity on
specific patterns or signatures.

A

Spero

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A “fuzzy fingerprinting” engine that uses static or passive heuristics.

A

Ethos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly