Endpoint Monitoring Flashcards

1
Q

Software capable of detecting and removing virus infections and (in most cases)
other types of malwares, such as worms, Trojans, rootkits, adware, spyware,
password crackers, network mappers, DoS tools, and others

A

Anti-virus (AV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of IDS or IPS that monitors a computer system for unexpected behavior or
drastic changes to the system’s state on an endpoint

A

Host-based IDS/IPS (HIDS/HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A software agent and monitoring system that performs multiple security tasks
such as anti-virus, HIDS/HIPS, firewall, DLP, and file encryption

A

Endpoint Protection Platform (EPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A software agent that collects system data and logs for analysis by a monitoring
system to provide early detection of threats

A

Endpoint Detection and Response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A system that can provide automated identification of suspicious activity by user
accounts and computer hosts

A

User and Entity Behavior Analytics (UEBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A computing environment that is isolated from a host system to guarantee that the
environment runs in a controlled, secure fashion and that communication links between the sandbox and the host are usually completely prohibited

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of analyzing the structure of hardware or software to reveal more
about how it functions

A

Reverse Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A computer program that translates machine language into assembly language

A

Disassembler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The binary code executed by the processor, typically represented as 2 hex digits
for each byte

A

Machine Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The first two bytes of a binary header that indicates it file type
When reading the first two bytes of a Windows portable executable file (EXE, DLL,
SYS, DRV, or COM), it will always start with 4D 5A in HEX, MZ in ASCII, or TV in
Base64 encoding

A

File Signature (or Magic Number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The native processor instructions used to implement the program

A

Assembly Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software that translate a binary or low-level machine language code into higher
level code

A

Decompiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Real or pseudocode in human readable form that makes it easier to identify
functions, variables, and programming logic used in the cod

A

High-level Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any sequence of encoded characters that appears within the executable file

A

Strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A method of compression in which an executable is mostly compressed and the
part that isn’t compressed contains the code to decompress the executable

A

Program Packer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describes the specific method by which malware code infects a target host

A

Exploit Technique

17
Q

Malware designed to install or run other types of malwares embedded in a
payload on an infected host

A

Dropper

18
Q

A piece of code that connect to the Internet to retrieve additional tools after the
initial infection by a dropper

A

Downloader

19
Q

Any lightweight code designed to run an exploit on the target, which may include
any type of code format from scripting languages to binary code

A

Shellcode

20
Q

Exploit technique that runs malicious code with the identification number of a
legitimate process
▪ Masquerading
▪ DLL injection
▪ DLL sideloading
▪ Process hollowing

A

Code Injection

21
Q

Exploit techniques that use standard system tools and packages to perform
intrusions

A

Living Off the Land

22
Q

Threat hunting and security monitoring must use behavioral-based techniques to
identify infections

A

Behavioral Analysis

23
Q

A suite of tools designed to assist with troubleshooting issues with Windows, and
many of the tools are suited to investigating security issues

A

Sysinternals

24
Q

A kernel-level binary that is the parent of the first user-mode process (Session
Manager SubSystem – smss.exe)

A

System Idle (PID 0) and System (PID 4)

25
Q

Manages low-level Windows functions and it is normal to see several of these
running
(as long as they are launched from %SystemRoot%\System32 and have no parent)

A

Client Server Runtime SubSystem (csrss.exe)

26
Q

Manages drivers and services and should only have a single instance running as a
process

A

WININIT (wininit.exe)

27
Q

Hosts nonboot drivers and background services, this process should only have one
instance of services.exe running as a child of wininit.exe, with other service
processes showing a child of services.exe or svchost.exe

A

Services.exe

28
Q

Handles authentication and authorization services for the system, and should
have a single instance running as a child of wininit.exe

A

Local Security Authority SubSystem (lsass.exe)

29
Q

Manages access to the user desktop and should have only one instance for each
user session with the Desktop Window Manager (dwm.exe) as a child process in
modern versions of Windows

A

WINLOGON (winlogon.exe)

30
Q

Sets up the shell (typically explorer.exe) and then quits, so you should only see
this process briefly after log-on

A

USERINIT (userinit.exe)

31
Q

This is the typical user shell, launched with the user’s account privileges rather
than SYSTEM’s, and is likely to be the parent for all processes started by the
logged-on user

A

Explorer (explorer.exe)

32
Q

Endpoint detection and response (EDR) requires tuning to reduce false positives

A

EDR Configuration

33
Q

Inspects items with over 70 antivirus scanners and URL/domain
blacklisting services, in addition to a myriad of tools to extract signals from the
studied content

A

VirusTotal (virustotal.com)

34
Q

A standardized language for sharing structured information about malware that is
complementary to STIX and TAXII to improve the automated sharing of threat
intelligence

A

Malware Attribute Enumeration and Characterization (MAEC) Scheme

35
Q

A multi-platform program running on Windows, Linux and Mac OS X for
identifying, classifying, and describing malware samples

A

Yara

36
Q

The process of blocking known applications, services, traffic, and other
transmission to and from your systems

A

Blacklisting

37
Q

The process of allowing only known applications, services, traffic, and other
transmission to and from your systems

A

Whitelisting

38
Q

The process of determining what additional software may be installed on a client
or server beyond its baseline
Execution control can be configured as a whitelisting or blacklisting approach
Execution Control in Windows
▪ Software Restriction Policies (SRP)
▪ AppLocker
▪ Windows Defender Application Control (WDAC)
Execution Control in Linux
▪ Mandatory Access Control (MAC)
▪ Linux Security Module (LSM)

A

Execution Control