Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 33 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 33
Topic #: 1
[All 312-50v12 Questions]

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs.
What type of malware did the attacker use to bypass the company’s application whitelisting?

  • A. File-less malware
  • B. Zero-day malware
  • C. Phishing malware
  • D. Logic bomb malware
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
eli117
Highly Voted 1 year, 7 months ago
Selected Answer: A
A. File-less malware Explanation: In this scenario, the attacker used file-less malware to bypass the company's application whitelisting. File-less malware resides entirely in memory, making it difficult for antivirus software and IDS/IPS to detect. It can run in the context of a trusted process or system application, and can be delivered through various attack vectors, including phishing emails, malicious websites, or network exploits.
upvoted 7 times
...
kikour
Most Recent 7 months, 2 weeks ago
Selected Answer: B
0day because it's most likely not in a whitelist, IDS/IPS may detect file-less still
upvoted 2 times
...
insaniunt
11 months, 3 weeks ago
Selected Answer: A
A. File-less malware
upvoted 1 times
...
Vincent_Lu
1 year, 5 months ago
A. File-less malware should be the answer. But why not B?
upvoted 2 times
deviii
1 year, 4 months ago
Because it's mentioned AV didn't flag any "non-whitelisted file"
upvoted 2 times
mattlai
1 year, 3 months ago
zero day does not necessarily need a file to execute
upvoted 2 times
...
...
...
jeremy13
1 year, 7 months ago
Selected Answer: A
A. File-less malware 312-50v11 Q164 https://www.trellix.com/en-us/security-awareness/ransomware/what-is-fileless-malware.html
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...