Endpoint Monitoring Flashcards

1
Q

Software capable of detecting and removing virus infections and (in most cases)
other types of malwares, such as worms, Trojans, rootkits, adware, spyware,
password crackers, network mappers, DoS tools, and others

A

Anti-virus (AV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of IDS or IPS that monitors a computer system for unexpected behavior or
drastic changes to the system’s state on an endpoint

A

Host-based IDS/IPS (HIDS/HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A software agent and monitoring system that performs multiple security tasks
such as anti-virus, HIDS/HIPS, firewall, DLP, and file encryption

A

Endpoint Protection Platform (EPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A software agent that collects system data and logs for analysis by a monitoring
system to provide early detection of threats

A

Endpoint Detection and Response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A system that can provide automated identification of suspicious activity by user
accounts and computer hosts

A

User and Entity Behavior Analytics (UEBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A computing environment that is isolated from a host system to guarantee that the
environment runs in a controlled, secure fashion and that communication links between the sandbox and the host are usually completely prohibited

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of analyzing the structure of hardware or software to reveal more
about how it functions

A

Reverse Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A computer program that translates machine language into assembly language

A

Disassembler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The binary code executed by the processor, typically represented as 2 hex digits
for each byte

A

Machine Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The first two bytes of a binary header that indicates it file type
When reading the first two bytes of a Windows portable executable file (EXE, DLL,
SYS, DRV, or COM), it will always start with 4D 5A in HEX, MZ in ASCII, or TV in
Base64 encoding

A

File Signature (or Magic Number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The native processor instructions used to implement the program

A

Assembly Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software that translate a binary or low-level machine language code into higher
level code

A

Decompiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Real or pseudocode in human readable form that makes it easier to identify
functions, variables, and programming logic used in the cod

A

High-level Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any sequence of encoded characters that appears within the executable file

A

Strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A method of compression in which an executable is mostly compressed and the
part that isn’t compressed contains the code to decompress the executable

A

Program Packer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describes the specific method by which malware code infects a target host

A

Exploit Technique

17
Q

Malware designed to install or run other types of malwares embedded in a
payload on an infected host

18
Q

A piece of code that connect to the Internet to retrieve additional tools after the
initial infection by a dropper

A

Downloader

19
Q

Any lightweight code designed to run an exploit on the target, which may include
any type of code format from scripting languages to binary code

20
Q

Exploit technique that runs malicious code with the identification number of a
legitimate process
▪ Masquerading
▪ DLL injection
▪ DLL sideloading
▪ Process hollowing

A

Code Injection

21
Q

Exploit techniques that use standard system tools and packages to perform
intrusions

A

Living Off the Land

22
Q

Threat hunting and security monitoring must use behavioral-based techniques to
identify infections

A

Behavioral Analysis

23
Q

A suite of tools designed to assist with troubleshooting issues with Windows, and
many of the tools are suited to investigating security issues

A

Sysinternals

24
Q

A kernel-level binary that is the parent of the first user-mode process (Session
Manager SubSystem – smss.exe)

A

System Idle (PID 0) and System (PID 4)

25
Manages low-level Windows functions and it is normal to see several of these running (as long as they are launched from %SystemRoot%\System32 and have no parent)
Client Server Runtime SubSystem (csrss.exe)
26
Manages drivers and services and should only have a single instance running as a process
WININIT (wininit.exe)
27
Hosts nonboot drivers and background services, this process should only have one instance of services.exe running as a child of wininit.exe, with other service processes showing a child of services.exe or svchost.exe
Services.exe
28
Handles authentication and authorization services for the system, and should have a single instance running as a child of wininit.exe
Local Security Authority SubSystem (lsass.exe)
29
Manages access to the user desktop and should have only one instance for each user session with the Desktop Window Manager (dwm.exe) as a child process in modern versions of Windows
WINLOGON (winlogon.exe)
30
Sets up the shell (typically explorer.exe) and then quits, so you should only see this process briefly after log-on
USERINIT (userinit.exe)
31
This is the typical user shell, launched with the user's account privileges rather than SYSTEM's, and is likely to be the parent for all processes started by the logged-on user
Explorer (explorer.exe)
32
Endpoint detection and response (EDR) requires tuning to reduce false positives
EDR Configuration
33
Inspects items with over 70 antivirus scanners and URL/domain blacklisting services, in addition to a myriad of tools to extract signals from the studied content
VirusTotal (virustotal.com)
34
A standardized language for sharing structured information about malware that is complementary to STIX and TAXII to improve the automated sharing of threat intelligence
Malware Attribute Enumeration and Characterization (MAEC) Scheme
35
A multi-platform program running on Windows, Linux and Mac OS X for identifying, classifying, and describing malware samples
Yara
36
The process of blocking known applications, services, traffic, and other transmission to and from your systems
Blacklisting
37
The process of allowing only known applications, services, traffic, and other transmission to and from your systems
Whitelisting
38
The process of determining what additional software may be installed on a client or server beyond its baseline Execution control can be configured as a whitelisting or blacklisting approach Execution Control in Windows ▪ Software Restriction Policies (SRP) ▪ AppLocker ▪ Windows Defender Application Control (WDAC) Execution Control in Linux ▪ Mandatory Access Control (MAC) ▪ Linux Security Module (LSM)
Execution Control