Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 243 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 243
Topic #: 1
[All 312-50v12 Questions]

During a comprehensive security assessment, your cybersecurity team at XYZ Corp stumbles upon signs that point toward a possible Advanced Persistent Threat (APT) infiltration in the network infrastructure. These sophisticated threats often exhibit subtle indicators that distinguish them from other types of cyberattacks. To confirm your suspicion and adequately isolate the potential APT, which of the following actions should you prioritize?

  • A. Investigate for anomalies in file movements or unauthorized data access attempts within your database system
  • B. Scrutinize for repeat network login attempts from unrecognized geographical regions
  • C. Vigilantly monitor for evidence of zero-day exploits that manage to evade your firewall or antivirus software
  • D. Search for proof of a spear-phishing attempt, such as the presence of malicious emails or risky attachments
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
insaniunt
9 months ago
Selected Answer: A
A. Investigate for anomalies in file movements or unauthorized data access attempts within your database system
upvoted 2 times
...
calx5
9 months ago
Selected Answer: A
A, file movement or unauthorized access
upvoted 2 times
...
brrbrr
9 months ago
Selected Answer: A
Advanced Persistent Threats (APTs) often involve long-term, stealthy attacks aimed at unauthorized access and data exfiltration. One common characteristic is the persistence and subtle nature of these threats. Investigating anomalies in file movements or unauthorized data access attempts within the database system can help detect and confirm the presence of an APT. Monitoring for unusual patterns or activities within the database system is crucial in identifying and mitigating advanced and persistent threats.
upvoted 3 times
duke_of_kamulu
8 months, 3 weeks ago
ANSWER IS A reason looking for signs Specific Warning Signs APT attacks are usually impossible to detect. However, some indications of an attack include inexplicable user account activities, the presence of a backdoor Trojan for maintaining access to the network, unusual file transfers and file uploads, unusual database activities, etc.
upvoted 1 times
...
...
qwerty100
9 months ago
Selected Answer: A
A. Investigate for anomalies in file movements or unauthorized data access attempts within your database system Module 07 page 965
upvoted 3 times
...
lukinno
9 months ago
I think A, C, D are correct. Prioritize actions related to monitoring file movements, detecting zero-day exploits, and investigating spear-phishing attempts.
upvoted 1 times
...
duke_of_kamulu
9 months ago
965 Evading Signature-Based Detection Systems APT attacks are closely related to zero-day exploits, which contain malware that has never been previously discovered or deployed. Thus, APT attacks can easily bypass security mechanisms such as firewalls, antivirus software, IDS/IPS, and email spam filters.
upvoted 1 times
...
kennels
9 months, 1 week ago
Selected Answer: B
B. Scrutinize for repeat network login attempts from unrecognized geographical regions
upvoted 1 times
...
JustAName
9 months, 1 week ago
Selected Answer: A
I'd pick A since APT is not only through zero-day exploits, it can be through other method like social engineering as well. In my opinion, Option C kind of limit our investigation.
upvoted 1 times
...
Nopez
9 months, 1 week ago
It is "A", page 648
upvoted 1 times
...
Nopez
9 months, 1 week ago
It is "A", page 648
upvoted 2 times
...
insaniunt
9 months, 2 weeks ago
why not A?
upvoted 1 times
...
[Removed]
9 months, 2 weeks ago
Hey team can we double-check this response
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...