Indicators of Malicious Activity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities is called:

IoC

2
New cards

An account lockout might indicate which type of malicious activity?

Password brute-forcing attempt

3
New cards

 Which of the terms listed below most accurately describes a situation wherein a single account is being used from multiple locations/devices at the same time?

Concurrent session usage

4
New cards

Which of the following terms refers to a malicious activity indicator in a situation where a firewall or other security measure prevents an attempt to deliver malicious payload or perform an unauthorized action?

Blocked content

5
New cards

Which of the terms listed below most accurately describes a situation wherein an account is accessed from a location that is physically impossible for the user to be in?

Impossible travel

6
New cards

The term "Out-of-cycle logging" refers to instances where systems or applications produce logs outside their regular intervals or in abnormal volumes, potentially signaling malicious activity.

True

7
New cards

Which of the following would indicate an attempt to hide evidence of malicious activity?

Missing logs