Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 268 discussion

Actual exam question from ISC's CISSP
Question #: 268
Topic #: 1
[All CISSP Questions]

Which of the following techniques is MOST useful when dealing with advanced persistent threat (APT) intrusions on live virtualized environments?

  • A. Memory forensics
  • B. Logfile analysis
  • C. Reverse engineering
  • D. Antivirus operations
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
dirk_gentley
Highly Voted 2 years, 2 months ago
Selected Answer: A
A. Memory forensics for LIVE analysis https://www.varonis.com/blog/memory-forensics
upvoted 10 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
YesPlease
Most Recent 11 months, 2 weeks ago
Selected Answer: B
Answer B) Logfile Analysis APT use different methods like malware, social engineering to gain legit credentials, penetration testing, etc...to compromise a system, but it doesn't have to use all of them. Memory forensics is useless if there is no malicious code to discover. However, logging can uncover all of these types of compromise as a "paper" trail should be left behind with each movement. https://blog.scanner.dev/security-logs-and-apts/
upvoted 3 times
...
Dee83
1 year, 10 months ago
Memory forensics is considered one of the most useful techniques when dealing with advanced persistent threat (APT) intrusions on live virtualized environments. It allows for the analysis of a system's memory in order to identify malicious activity that may not be detected by other methods, such as antivirus operations. Logfile analysis and reverse engineering can also be useful in identifying and understanding the nature of an APT intrusion.
upvoted 1 times
...
DJOEK
1 year, 10 months ago
Selected Answer: A
Memory forensics is the practice of analyzing a computer system's volatile memory (RAM) to extract evidence of past activity, such as running processes, network connections, and open files. This is especially useful when dealing with Advanced Persistent Threats (APT) intrusions on live virtualized environments because the APT often attempts to hide its presence by manipulating system logs or using rootkits and other malware to cover its tracks. By analyzing the system's volatile memory, a forensic investigator can identify signs of intrusion and other malicious activity that may not be visible in other areas of the system, such as in the file system or on disk.
upvoted 3 times
...
oudmaster
1 year, 11 months ago
I vote for C ! From official Guide: However, specialists in the field of reverse engineering may be able to reverse the compilation process with the assistance of tools known as decompilers and disassemblers. Decompilers attempt to take binary executables and convert them back into source code form, whereas disassemblers convert back into machine-readable assembly language (an intermediate step during the compilation process). These tools are particularly useful when you’re performing malware analysis or competitive intelligence and you’re attempting to determine how an executable file works without access to the underlying source code.
upvoted 2 times
...
Jamati
2 years ago
Selected Answer: D
Once the intrusion has already happened, then you need antivirus / antimalware software to detect and clean it out.
upvoted 1 times
oudmaster
1 year, 11 months ago
wrong, because intrusions cloud include no files or url to detect with AV. For example, remote code execution attack.
upvoted 1 times
...
...
JAckThePip
2 years, 1 month ago
Answer a " This paper proposes a novel APT Trojan detection method by utilizing memory forensics techniques." https://www.scientific.net/AMM.701-702.927
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...