Ports 80 and 443
What is HTTP/HTTPS?
The events "Domain Controller failed to validate the credentials of the account" and "An Account Failed to login" belongs to which offense?
What is General Authentication Failure?
A person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.
What is a script kiddie?
Contents such as IP addresses, file hashes, misspelling, asking for PII, or a sense of urgency in an email are.
What are IoC's?
The HR contact for the Plano office
Who is Melissa Blandford?
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as
What is Ransomware?
What must you input into a reputation checker to check whether a website is malicious or not?
What are IP Addresses or Domains?
A computer attack in which malicious code is embedded in a poorly-designed application and then passed to the back-end database. The malicious data then produces database query results or actions that should never have been executed.
What is SQL injection attack?
Automation software that James uses for his project.
What is Demisto?
Wipro's CEO
Who is Abidali Neemuchwala (Abid)?
A lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall is commonly referred to as.
What is a DMZ?
Instead of uploading an actual file, what can be uploaded into VirusTotal to check the reputation?
What is a file hash?
An attack in which a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
What is a MITM (Man In The Middle) attack?
The cloud software that Jeffrey uses
What is Microsoft Azure?
The names of our local IMG team (IT Support department)
Who are Sarin and Arturo?
A logical partition of an IP network into multiple, smaller network segments.
What is a subnet?
If you have observed a "Remote to Local communication" event. Besides the reputation, what other type of communication must you check for?
What is reverse communication?
This port allows malicious hackers to remotely log onto the computers of unsuspecting users — across the Internet. It is known technically as "SMB over IP".
What is port 445?
Series of action/events that are executed automatically
What is a playbook?
Be passionate about client success
Treat each person with respect
Be global and responsible
Unyielding integrity in everything we do
What are the four pillars of the Spirit of Wipro?
A type of Policy stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as
What is Acceptable Use Policy?
A data source such as firewalls and servers that creates an event and parses information into QRadar.
What are log sources?
This type of malware is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Additionally, it is a polymorphic banking Trojan that can evade typical signature-based detection. It has several methods for maintaining persistence, including auto-start registry keys and services. It uses modular Dynamic Link Libraries (DLLs) to continuously evolve and update its capabilities. Furthermore, it is Virtual Machine-aware and can generate false indicators if run in a virtual environment.
What is Emotet?
A utility that records the path (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer. It also calculates and displays the amount of time each hop took.
What is a traceroute?
W.I.P.R.O stands for
Western India Palm Refined Oil Limited