Question 1
Which of the following is a suspicious process behavior?
I agree with the community consensus of Option D. In security monitoring and CrowdStrike Falcon analysis, identifying processes performing actions outside of their expected baseline—such as a text editor initiating network traffic—is a primary indicator of compromise.
Reason
Option D is correct because notepad.exe is a local text editing utility that has no legitimate requirement to initiate outbound network connections. When a non-network process behaves this way, it typically indicates process hollowing or a malicious DLL injection where an attacker is using a trusted binary to bypass firewall rules or perform command and control (C2) communications.
Why the other options are not as suitable
- Option A is incorrect because RemoteSigned is a common and relatively restrictive PowerShell Execution Policy that allows local scripts to run while requiring downloaded scripts to be signed by a trusted publisher; it is not inherently suspicious.
- Option B is incorrect because Internet browsers are expected to make frequent DNS requests as part of normal web navigation and resource loading.
- Option C is incorrect because PowerShell launching a script is a standard administrative and functional behavior in Windows environments; while scripts can be malicious, the act itself is a native feature and less indicative of an anomaly than a text editor reaching out to the internet.
