Q: 1
You are tasked with creating a custom Indicator of Attack (IOA) rule to monitor employees using non-
standard web browsers that could indicate shadow IT activity. Which of the following rule conditions
would best achieve this objective?
Options
Discussion
Option D
Makes sense to alert on any browser process not matching the main approved executables. Fits shadow IT detection best, pretty sure this is what they want.
B , official guide and practice tests sometimes point to parent process logic for process monitoring questions like this.
Its B, not D. B sometimes catches launches from explorer that D would miss if the exe name is odd. Saw a similar trap in other practice sets.
B isn't quite right here, D nails it. Using a whitelist approach (only allowing chrome.exe, firefox.exe, msedge.exe) actually catches anything out of the ordinary, which is what you want for shadow IT monitoring. B's parent process logic could miss a browser launched in different ways and leads to more gaps. Pretty sure it's D but open to other takes if anyone disagrees.
D tbh, best way to catch anything that's not Chrome, Firefox, or Edge popping up.
Not A, D makes more sense. Allow-listing the official browser EXEs and flagging anything else should spot non-standard browsers that employees might use for shadow IT. The other options could trigger too many false positives or just aren't specific enough. Anyone see a reason to pick B over D?
Be respectful. No spam.
Question 1 of 35