ExamGecko
Question list
Search
Search

Related questions











Question 249 - 312-50v12 discussion

Report
Export

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfilltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any nonwhitelisted programs, what type of malware did the attacker use to bypass the company's application whitelisting?

A.
Phishing malware
Answers
A.
Phishing malware
B.
Zero-day malware
Answers
B.
Zero-day malware
C.
File-less malware
Answers
C.
File-less malware
D.
Logic bomb malware
Answers
D.
Logic bomb malware
Suggested answer: C

Explanation:

https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware/what-is-filelessmalware. html Fileless malware can easily evade various security controls, organizations need to focus on monitoring, detecting, and preventing malicious activities instead of using traditional approaches such as scanning for malware through file signatures.Also known as non-malware, infects legitimate software, applications, and other protocols existing in the system to perform various malicious activities.It resides in the system's RAM. It injects malicious code into the running processes. (P.966/950)

asked 18/09/2024
Elliott Leighton-Woodruff
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first