Indicators of Compromise Flashcards
1
Q
Indicators or signs that unauthorized activity has compromised an information system
A
Indicators of Compromise
2
Q
IOCs act as breadcrumbs for
A
incident response investigators
3
Q
IOCs symptoms can sometimes be exhibited due to
A
technical issues
4
Q
Unusual outbound
A
network traffic
5
Q
Anomalies in
A
privileged user account activity
6
Q
Geographical irregularities in
A
network traffic
7
Q
account login
A
Red flags
8
Q
Database read volume
A
Increas
9
Q
Large number of requests
A
for same files
10
Q
Mismatched port-application traffic
A
encrypted traffic over plain ports
11
Q
Suspicious registry or
A
system file changes
12
Q
Unusual DNS
A
Requests
13
Q
Unexpected system
A
patching
14
Q
Mobile device
A
profile changes
15
Q
Bundles of data in
A
wrong places
16
Q
Web traffic with non-human
A
behavior