Question 1
An analyst would like to visualize threat objects across their environment and chronological risk events for a Risk Object in Incident Review. Where would they find this?
Question 2
An adversary uses "LoudWiner" to hijack resources for crypto mining. What does this represent in a TTP framework?
Question 3
An analyst is looking at Web Server logs, and sees the following entry as the last web request that a server processed before unexpectedly shutting down:
[51.125.121.100 - [28/01/2006:10:27:10 -0300] "POST /cgi-bin/shurdown/ HTTP/1.0" 200 3304] What kind of attack is most likely occurring?
[51.125.121.100 - [28/01/2006:10:27:10 -0300] "POST /cgi-bin/shurdown/ HTTP/1.0" 200 3304] What kind of attack is most likely occurring?
Question 4
An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn't seem to be any associated increase in incoming traffic.
What type of threat actor activity might this represent?
What type of threat actor activity might this represent?
Question 5
Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?
