Security Operations Fundamentals Flashcards

1
Q

Components of SOAR

A

Orchestration
Automation
Reponse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SOAR

A

SOAR tools ingest aggregated alerts from detection sources (such as SIEMs, network security tools, and mailboxes) before executing automatable, process-driven playbooks to enrich and respond to these alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SIEM

A

SIEM’s collect disparate pieces of data and aggregate them into alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What tool or technology can the security operations team use to ingest aggregated alerts and execute an automated process-driven playbook?

A

SOAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the name of Palo’s XDR solution?

A

Cortex XDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exploits

A

Exploits are the results of techniques used against a system that is designed to gain access through vulnerabilities in the code of an operating system or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware

A

Malware is a file or code that infects, explores, steals, or conducts virtually any behavior an attacker wants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ransomware

A

Ransomware is a form of malware that holds valuable files, data, or information for ransom, often by encrypting data, with the attacker holding the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Palo’s native threat intelligence is powered by what?

A

Unit 42

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What Is Native Threat Intelligence?

A

Native threat intelligence, powered by Unit 42, provides intel from multiple Palo Alto Networks services. Using native threat intelligence, you can investigate indicators and their behaviors and use that knowledge to better safeguard your network from malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Native Threat Intelligence provides data from?

A

WF - Wildfire

UF - URL Filtering database

Internal Unit 42 team

Third party feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WF

A

Wildfire - cloud based malware sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UF

A

PAN URL Filtering database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Intel Interface Tabs

A

XSOAR Indicators

Sample Analysis

Sessions and Submissions

Threat Intel Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

XSOAR Indicators

A

You can now perform lookups in Unit 42 Intel for IP addresses, URLs, domains, and SHA-256 hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sample Analysis

A

Unit 42 Intel provides a full report of activities, properties, and behaviors associated with file samples, enabling you to find links between attacks and analyze threat patterns.

17
Q

Sessions and Submissions

A

You can now use sessions and submissions data from Palo Alto Networks firewalls, WildFire, Cortex XDR, Prisma SaaS, and Prisma Access for investigation and analysis.

18
Q

Threat Intel Reports

A

You can now publish a report and access threat intel reports written by other analysts.

19
Q

Benefits of Native Threat Intelligence

A

1 - Act with Confidence

2 - Inform Next Steps in Response

3 - Identify and Monitor new threats

20
Q

What are three data sources security operations teams can use to investigate indicators and their behaviors? (Choose three.)

A

Unit 42

URL Filtering Database

Wildfire

21
Q

Which Threat Intel interface tab allows you to perform lookups in Unit 42 Intel IP addresses, URLs, domains, and SHA-256 hashes?

A

XSOAR Indicators

22
Q

Elements of Security Operations

A

details the building blocks of simpler, more effective security operations, drawing from our experts’ real-world experiences to help you build capabilities that deserve your confidence. You’ll learn how you can: