Reference no: EM133958032
Assignment:
Host-Related IoC Analysis
1. Why might a host-related IoC manifest as abnormal OS process behavior rather than as a malicious process?
2. What type of evidence can be retrieved from system memory analysis?
3. Why are CPU, memory, and disk space consumption IoCs used to identify incidents?
4. What type of security information is primarily used to detect unauthorized privilege IoCs?
5. What are the main types of IoCs that can be identified through analysis of the Registry?
Application-Related IoC Analysis
1. You are assisting an incident responder with an overview of application-related IoCs. What are the unexpected output indicators of intrusion events?
2. In the context of digital forensics, what is VMI?
3. In mobile digital forensics, what is the difference between manual and logical extraction?
Lateral Movement and Pivot IoC Analysis
1. What operational control can you use to prevent the abuse of domain administrator accounts by pass-the-hash attacks?
2. Which source of security data can be used to detect pass the hash and golden ticket attacks?