exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 243 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 243
Topic #: 1
[All 312-50v13 Questions]

During a comprehensive security assessment, your cybersecurity team at XYZ Corp stumbles upon signs that point toward a possible Advanced Persistent Threat (APT) infiltration in the network infrastructure. These sophisticated threats often exhibit subtle indicators that distinguish them from other types of cyberattacks. To confirm your suspicion and adequately isolate the potential APT, which of the following actions should you prioritize?

  • A. Investigate for anomalies in file movements or unauthorized data access attempts within your database system
  • B. Scrutinize for repeat network login attempts from unrecognized geographical regions
  • C. Vigilantly monitor for evidence of zero-day exploits that manage to evade your firewall or antivirus software
  • D. Search for proof of a spear-phishing attempt, such as the presence of malicious emails or risky attachments
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Dogeo
2 days, 4 hours ago
Selected Answer: A
To confirm and isolate an APT, you should prioritize investigating anomalies in file movements and unauthorized data access. This strategy targets the core behavior of APTs—persistent, stealthy actions aimed at data exfiltration and maintaining access to the network over time.
upvoted 1 times
...
pindinga1
2 weeks, 2 days ago
Selected Answer: A
The best action to prioritize in confirming and isolating a potential Advanced Persistent Threat (APT) would be: A. Investigate for anomalies in file movements or unauthorized data access attempts within your database system. Here’s why: APTs are typically characterized by their stealthy, persistent nature and focus on long-term infiltration. They often involve gradual exfiltration of sensitive data, lateral movement through the network, and the use of non-obvious attack methods (e.g., leveraging legitimate credentials).
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago