Commercial Defense Products Flashcards

1
Q

What functionalities does the SentinelOne Singularity Platform integrate?

A
  • prevention
  • detection
  • response
  • hunting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does AI-Powered Static Analysis work in the SentinelOne Singularity Platform?

A

files are analyzed before they are executed - enables it to identify and block malware, including unknown or zero-day threats, based on their characteristics and behavior patterns

prevention capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of the SentinelOne’s Behavioral AI engine?

A

analyze the behavior of processes and applications in real-time - if a process behaves anomalously or shows patterns indicative of malicious activity (such as attempts to encrypt files for ransomware), it’s flagged and stopped before it can cause harm

prevention capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of exploit does Exploit Prevention protect against?

A
  • memory exploitation
    • monitors memory operations in real-time to detect and block common exploitation techniques like buffer overflows, heap spraying, and stack pivots
  • known and undknown exploits
    • AI engine is trained to recognize a variety of exploit techniques and can detect those that are known as well as those that are unknown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does SentinelOne Singularity Platform prefent from Fileless attacks?

A

by monitoring and analyzing in-memory activities and script executions to identify and stop fileless attack tactics, such as PowerShell exploits and malicious WMI scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kind of malicious activities is Application Behavior Monitoring designed to stop?

A

unusual modification of system settings, unauthorized access to sensitive data, or attempts to execute code in the context of another process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does ActiveEDR help security analysts?

A

instead of assembling stories, the analyst can review full, contextualized stories, based on a single IOC search - allows security teams to understand the story and root cause behind a threat quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of ActiveEDR?

A
  • trace and contextualize all system processes to understand attack stories
  • identifying and stopping attacks in progress before they can spread or cause significant damage
  • threat detection and response at machine speed

part of the Singularity Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does SentinelOne integrate threat intelligence?

A

in real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of information does the SentinelOne Threat Intelligence include?

A

information about the latest malware campaigns, threat actor tactics, and vulnerability exploits, enabling the platform to stay ahead of emerging threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of SentinelOne’s Hologram product?

A

provide deep visibility into the authenticity of existing software installations and runtime integrity, helping to protect against fileless attacks, living-off-the-land (LotL) tactics, and script-based attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of SentinelOne’s Storyline Active Response (STAR) component?

A

help in automating responses to threats, significantly reducing the time and resources required to respond to incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly