Prevention Policy Settings Flashcards

1
Q
  1. Application Exploitation Activity
  2. Chopper Webshell
  3. Drive-by Download
  4. Code Injection
  5. Javascript Execution via Rundll
A

Behavior-Based Prevention-Exploitation Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud Anti-Malware (for online hosts)

  • Cautious
  • Moderate
  • Aggressive
  • Extra Aggressive
A

NGAV - Cloud Machine Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Windows Logon Bypass

2. Credential Dumping

A

Behavior-Based Lateral Movement and Credential Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Notify End Users
  2. Unknown exe
  3. Unknown Detection related exe
A

Mac Only Sensor Capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Notify End Users
  2. Unknown exe
  3. Unknown Detection related exe
  4. Sensor Tampering Protection
A

Windows Only Sensor Capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Script-Based execution monitoring

A

Mac Only - Sensor Visibility - Enhanced Visibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Sensor Anti-Malware (Cautious, Mod, Agg, XAgg)

2. Adware & PUP

A

NGAV - Sensor Machine Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Custom Blocking
  2. Suspicious Porcesses
  3. Intel Sourced Threats
A

Mac- Malware Protection - Execution Blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. kcpassword

2. hash collector

A

Mac - Behavior-Based Prevention - Credential Dumping Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. XPCOM Shell
  2. Chopper webshell
  3. Empyre backdoor
A

Mac - Behavior-Based Prevention - Unauthorized Remote Access IOAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. AUMD - Additional User Mode Data
  2. Interpreter Only
  3. Engine (Full Visibility) - Req. #2
  4. Script-Base exe monitoring
  5. HTTP Detections
  6. Redact HTTP Detection Details
A

Sensor Visibility - Enhanced Visibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Custom Blocking (IOC Mgmt)
  2. Suspicious Processes
  3. Suspicious Scripts & Commands
  4. Intel Sources Threats
  5. Suspicious Kernel Drivers
A

Malware Protection - Execution Blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Force ASLR
  2. Force DEP
  3. Heap Spray Preallocation
  4. NULL Page Allocation
  5. SEH Overwrite Protection
A

Behavior-Based Prevention - Exploit Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Backup Deletion
  2. Cryptowall
  3. File Encryption
  4. Locky
  5. File System Access
A

Behavior-Based Prevention - Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Custom Blocking

2. Suspicious Processes

A

Malware Protection - Execution Blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly