3 Replies Latest reply on Jun 12, 2017 1:48 AM by acocimano

    Momentum Webinar Contest - 8th June 2017

    michael.odriscoll SupportEmployee

      To enter this contest and have a chance to win a $50 Amazon.com gift card, reply to this post with your answers to the below questions;

      2612.jpg

       

      1. What is the name of today’s most prolific Exploit Kit?

       

      2. What is the purpose of an Exploit Kit?

       

      3. What (3) main categories, covered in the webinar, make up Defense in Depth?

       

      4. What Microsoft Knowledge Base ID is associated with preventing the WannaCrypt RansomWare vulnerability?

       

      5. What database table does vulnerable definitions get stored in?

       

      6. What are the three new options in Endpoint Security that enhance protection against malware?

       

      7. What do you set up the rules to protect modification of .DOCX and .XLSX files?

       

      8. Name 3 Community articles related to Endpoint Security.

       

      9. What are the 3 Application Behavior and Whitelist modes?

       

      10. What ports should be blocked to prevent SMB communication?

       

       

      See here for full terms and conditions; Momentum Webinar Contest

        • 1. Re: Momentum Webinar Contest - 8th June 2017
          Jeremy.Shupick Rookie

          1. What is the name of today’s most prolific Exploit Kit?

          RIG

          2. What is the purpose of an Exploit Kit?

          Exploit kits are powerful tools that allow hackers to steal personal information from a vast number of victims all at once. An exploit kit contains a group of exploits, or pieces of code that were written with the purpose of taking advantage of (or exploiting) a vulnerability on a victim’s machine and running malicious code on it.

          3. What (3) main categories, covered in the webinar, make up Defense in Depth?

          1st - Patch Management / 2nd - Ivanti Antivirus or Any Antivirus / 3rd - Endpoint Security

          4. What Microsoft Knowledge Base ID is associated with preventing the WannaCrypt RansomWare vulnerability?

          Microsoft Security Bulletin MS17-010 / KB4013389

          5. What database table does vulnerable definitions get stored in?

          Vulnerability Table

          6. What are the three new options in Endpoint Security that enhance protection against malware?

          App Control / Device Control / LANDesk Firewall

          7. What do you set up the rules to protect modification of .DOCX and .XLSX files?

          By restricting the ability to modify and create .DOCX and .XLSX documents only to Microsoft Word, Microsoft Excel no 3rd party application including ransomware can change or encrypt those files.

          8. Name 3 Community articles related to Endpoint Security.

          DOC-47945 / DOC-40279 / DOC-42512

          9. What are the 3 Application Behavior and Whitelist modes?

          Blocking / Learning / Log Only

          10. What ports should be blocked to prevent SMB communication?

          137 / 138 / 139 / 445

          • 2. Re: Momentum Webinar Contest - 8th June 2017
            rheckber Rookie

            1. RIG

            2. An exploit kit is a software kit designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it, and discovering and exploiting vulnerabilities to upload and execute malicious code on the client

            3. Patch Management, Antivirus, EPS-Endpoint Security

            4. MS17-010

            5. Vulnerability Table

            6. App Control, Device Control, LANDesk Firewall

            7. Only allowing MS-Word and MS-Excel to create and/or modify those files no other software such as ransomware can modify/create them.

            8. DOC-47857, DOC-47945, DOC-42512, DOC-40279

            9. Blocking, Learning, Log Only

            10. 137, 138, 139, 445

             

             

            • 3. Re: Momentum Webinar Contest - 8th June 2017
              acocimano Rookie

              1. RIG

               

              2. An exploit kit is a software kit designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it, and discovering and exploiting vulnerabilities to upload and execute malicious code on the client. In short terms a construction kit for malware

               

              3. Patch Management / Ivanti Antivirus or Any Antivirus /  Endpoint Security

               

              4. MS17-010 / KB4013389

               

              5. Vulnerability Table

               

              6. App Control / Device Control / LANDesk Firewall

               

              7. Allow only Microsoft Word and Microsoft Excel to modify and create .DOCX and .XLSX documents

               

              8. DOC-47945 / DOC-40279 / DOC-42512

               

              9. Blocking / Learning / Log Only

               

              10. 137 / 138 / 139 / 445