List of questions
Related questions
Question 546 - 312-50v12 discussion
An organization has been experiencing intrusion attempts despite deploying an Intrusion Detection System (IDS) and Firewalls. As a Certified Ethical Hacker, you are asked to reinforce the intrusion detection process and recommend a better rule-based approach. The IDS uses Snort rules and the new recommended tool should be able to complement it. You suggest using YARA rules with an additional tool for rule generation. Which of the following tools would be the best choice for this purpose and why?
A.
AutoYara - Because it automates the generation of YARA rules from a set of malicious and benign files
B.
yarGen - Because it generates YARA rules from strings identified in malware files while removing strings that also appear in goodware files
C.
YaraRET - Because it helps in reverse engineering Trojans to generate YARA rules
D.
koodous - Because it combines social networking with antivirus signatures and YARA rules to detect malware
Your answer:
0 comments
Sorted by
Leave a comment first