Answer B) Logfile Analysis
APT use different methods like malware, social engineering to gain legit credentials, penetration testing, etc...to compromise a system, but it doesn't have to use all of them. Memory forensics is useless if there is no malicious code to discover. However, logging can uncover all of these types of compromise as a "paper" trail should be left behind with each movement.
https://blog.scanner.dev/security-logs-and-apts/
Memory forensics is considered one of the most useful techniques when dealing with advanced persistent threat (APT) intrusions on live virtualized environments. It allows for the analysis of a system's memory in order to identify malicious activity that may not be detected by other methods, such as antivirus operations. Logfile analysis and reverse engineering can also be useful in identifying and understanding the nature of an APT intrusion.
Memory forensics is the practice of analyzing a computer system's volatile memory (RAM) to extract evidence of past activity, such as running processes, network connections, and open files. This is especially useful when dealing with Advanced Persistent Threats (APT) intrusions on live virtualized environments because the APT often attempts to hide its presence by manipulating system logs or using rootkits and other malware to cover its tracks. By analyzing the system's volatile memory, a forensic investigator can identify signs of intrusion and other malicious activity that may not be visible in other areas of the system, such as in the file system or on disk.
I vote for C
!
From official Guide:
However, specialists in the field of reverse engineering may be able to reverse the compilation process with the assistance of tools known as decompilers and disassemblers. Decompilers attempt to take binary executables and convert them back into source code form, whereas disassemblers convert back into machine-readable assembly language (an intermediate step during the compilation process). These tools are particularly useful when you’re performing malware analysis or competitive intelligence and you’re attempting to determine how an executable file works without access to the underlying source code.
Answer a
" This paper proposes a novel APT Trojan detection method by utilizing memory forensics techniques."
https://www.scientific.net/AMM.701-702.927
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
dirk_gentley
Highly Voted 2Â years, 2Â months agojackdryan
1Â year, 6Â months agoYesPlease
Most Recent 11Â months, 2Â weeks agoDee83
1Â year, 10Â months agoDJOEK
1Â year, 10Â months agooudmaster
1Â year, 11Â months agoJamati
2Â years agooudmaster
1Â year, 11Â months agoJAckThePip
2Â years, 1Â month ago