exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 793 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 793
Topic #: 1
[All 312-49v10 Questions]

In the event of a fileless malware attack, a Computer Hacking Forensics Investigator (CHFI) notes that the fileless malware has managed to persist even after the system reboots. What built-in Windows tool/utility might the attacker most likely have leveraged for this persistent behavior?

  • A. Windows Operation system components
  • B. Windows Task Scheduler
  • C. Windows AutoStart registry keys
  • D. Windows Process Explorer
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
044f354
3 days, 9 hours ago
Selected Answer: C
ECCouncil Official CHFI https://bookshelf.vitalsource.com/reader/books/9781635676969/ Module 14 Page 1356 - Windows AutoStart Registry Keys The AutoStart keys within the Windows registry, which allow programs to be executed automatically upon system reboot or user login, are the most common locations targeted by malware to achieve persistence on any compromised machine. - If you agree: UPVOTE this post to add your vote to the community tally. If you disagree: discuss with citations Both actions crowdsource best answers.
upvoted 1 times
...
4bd3116
8 months, 1 week ago
Selected Answer: C
C. Windows AutoStart Registry Keys Explanation: Fileless malware often leverages Windows AutoStart registry keys (such as those found in HKCU\Software\Microsoft\Windows\CurrentVersion\Run or HKLM\Software\Microsoft\Windows\CurrentVersion\Run) to achieve persistence. By creating or modifying entries in these registry keys, the malware can ensure that it executes each time the system starts, even if the original file-based components are not present.
upvoted 2 times
...
aqeel1506
8 months, 1 week ago
B. Windows Task Scheduler Explanation: Windows Task Scheduler: Persistence Mechanism: Attackers often use Windows Task Scheduler to create tasks that run on system startup or at scheduled intervals. This allows the malware to execute even after a reboot, making it a common method for maintaining persistence in fileless malware attacks. Windows AutoStart Registry Keys: Potential for Persistence: While AutoStart registry keys (such as those under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run) are indeed used for persistence, fileless malware often avoids traditional file-based mechanisms and may prefer leveraging scheduled tasks due to their ability to execute code directly from memory.
upvoted 1 times
...
ala76nl
8 months, 4 weeks ago
Selected Answer: C
Registry is most used
upvoted 3 times
...
Elb
10 months, 1 week ago
Selected Answer: B
Using task scheduler, attackers can set the malicious scripts to be triggered and executed automatically at a chosen time intervals.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago