exam questions

Exam PCCET All Questions

View all questions & answers for the PCCET exam

Exam PCCET topic 1 question 88 discussion

Actual exam question from Palo Alto Networks's PCCET
Question #: 88
Topic #: 1
[All PCCET Questions]

Which type of malware takes advantage of a vulnerability on an endpoint or server?

  • A. technique
  • B. patch
  • C. vulnerability
  • D. exploit
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
blahblah1234567890000
Highly Voted 1 year, 4 months ago
These are not types of malware, question is incorrect or answers are incorrect.
upvoted 5 times
...
leipeG
Most Recent 2 months, 3 weeks ago
Selected Answer: D
The type of malware that takes advantage of a vulnerability on an endpoint or server is: D. Exploit Exploits are malicious software or code that target known vulnerabilities in software, operating systems, or applications. They take advantage of these vulnerabilities to compromise or infect the targeted endpoint or server. Exploits are often used to deliver other types of malware or gain unauthorized access to a system. Options A, B, and C are related to the context of vulnerabilities and security but do not directly describe the malware that actively leverages vulnerabilities to compromise systems.
upvoted 1 times
...
splashy
6 months, 1 week ago
Weird question you would expect possible examples from malware So i choose D. Page 37 1.12 Differentiate between vulnerabilities and exploits An exploit is a type of malware that takes advantage of a vulnerability in installed endpoint or server software such as a web browser, Adobe Flash, Java, or Microsoft Office. An attacker crafts an exploit that targets a software vulnerability, causing the software to perform functions or execute code on behalf of the attacker.
upvoted 1 times
...
Syfusion
7 months, 1 week ago
Selected Answer: D
Answer is D Study Guide page 32 under Exploitation phase of the Cyberattack Lifecycle "An end user may unwittingly trigger an exploit, for example, by clicking a malicious link or opening an infected attachment in an email, or an attacker may remotely trigger an exploit against a known server vulnerability on the target network. Breaking the cyberattack lifecycle at this phase of an attack, as during the Reconnaissance phase, begins with proactive and effective end-user security awareness training that focuses on topics such as malware prevention and email security."
upvoted 2 times
...
rob899
10 months ago
Selected Answer: D
Answer is D
upvoted 2 times
...
dax
1 year ago
no correct answer. the nearest would be D
upvoted 1 times
...
csco10320953
1 year ago
Ansewer :D An exploit is a code that takes advantage of a software vulnerability or security flaw. It is written either by security researchers as a proof-of-concept threat or by malicious actors for use in their operations.
upvoted 1 times
...
HungHa
1 year, 2 months ago
answer is D An exploit is a type of malware that takes advantage of a vulnerability in installed endpoint or server software such as a web browser, Adobe Flash, Java, or Microsoft Office
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago