After running an Event Search, you can select many Event Actions depending on your results. Which of the following is NOT an option for any Event Action?
Start a Discussions
Which option indicates a hash is allowlisted?
Start a Discussions
Which of the following tactic and technique combinations is sourced from MITRE ATT&CK information?
Correct : D
According to the [MITRE ATT&CK website], MITRE ATT&CK is a knowledge base of adversary behaviors and techniques based on real-world observations. The knowledge base is organized into tactics and techniques, where tactics are the high-level goals of an adversary, such as initial access, persistence, lateral movement, etc., and techniques are the specific ways an adversary can achieve those goals, such as phishing, credential dumping, remote file copy, etc. Credential Access via OS Credential Dumping is an example of a tactic and technique combination sourced from MITRE ATT&CK information, which describes how adversaries can obtain credentials from operating system memory or disk storage by using tools such as Mimikatz or ProcDump.
Start a Discussions
What do IOA exclusions help you achieve?
Start a Discussions
Where are quarantined files stored on Windows hosts?
Start a Discussions