sandbox based Flashcards

(22 cards)

1
Q

What is the core idea behind sandboxing in cybersecurity?

A

“It’s a controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is dynamic behavior monitoring?

A

“Observing malware in action to see how it behaves once executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is memory forensics examination?

A

“Inspecting what’s happening in system memory to uncover hidden processes or injected code.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is network traffic inspection?

A

“Analyzing incoming and outgoing data packets to detect suspicious communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data correlation mapping?

A

“Connecting clues like file hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of ‘ID Ransomware’?

A

“An online tool that identifies ransomware variants and suggests decryption options for infected systems.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three main steps of ‘ID Ransomware’?

A

“Ransom note analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is done during ‘Ransom Note Analysis’ in ID Ransomware?

A

“Uploading the ransom message received from attackers.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is done during ‘Encrypted File Scanning’ in ID Ransomware?

A

“Comparing the affected file’s structure to known ransomware samples.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is done during ‘Attacker Address Matching’ in ID Ransomware?

A

“Checking associated email IDs or wallet addresses against a global ransomware database.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a sandbox in malware analysis?

A

“A controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a sandbox allow security teams to do?

A

“Understand how a threat operates in real conditions while ensuring the organization’s network stays protected.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Cuckoo Sandbox?

A

“One of the most widely used open-source sandboxing frameworks for malware analysis.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of analysis does Cuckoo Sandbox perform?

A

“Automated dynamic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Cuckoo Sandbox track during analysis?

A

“System calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does Cuckoo Sandbox help analysts understand malware interaction with the OS?

A

“By tracking system calls.”

17
Q

What does Cuckoo Sandbox reveal by capturing network activity?

A

“Command-and-control communication

18
Q

What does Cuckoo Sandbox support beyond execution behavior?

A

“Memory and process forensics.”

19
Q

What are ‘Indicators of Compromise’ (IOCs)?

A

“Information like file hashes

20
Q

How does Cuckoo Sandbox help with IOCs?

A

“It can export indicators of compromise (IOC) and YARA rules.”

21
Q

What is the benefit of Cuckoo Sandbox’s extensible plugin architecture?

A

“It allows security teams to customize analysis based on evolving threats.”

22
Q

What is the main benefit of sandbox-based detection?

A

“It strengthens malware and ransomware defense by safely revealing malicious behavior.”