Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v12 topic 1 question 33 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 33
Topic #: 1
[All 312-50v12 Questions]

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs.
What type of malware did the attacker use to bypass the company’s application whitelisting?

  • A. File-less malware
  • B. Zero-day malware
  • C. Phishing malware
  • D. Logic bomb malware
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
eli117
Highly Voted 1 year ago
Selected Answer: A
A. File-less malware Explanation: In this scenario, the attacker used file-less malware to bypass the company's application whitelisting. File-less malware resides entirely in memory, making it difficult for antivirus software and IDS/IPS to detect. It can run in the context of a trusted process or system application, and can be delivered through various attack vectors, including phishing emails, malicious websites, or network exploits.
upvoted 6 times
...
kikour
Most Recent 2 weeks, 4 days ago
Selected Answer: B
0day because it's most likely not in a whitelist, IDS/IPS may detect file-less still
upvoted 1 times
...
insaniunt
4 months, 3 weeks ago
Selected Answer: A
A. File-less malware
upvoted 1 times
...
Vincent_Lu
10 months, 3 weeks ago
A. File-less malware should be the answer. But why not B?
upvoted 2 times
deviii
9 months ago
Because it's mentioned AV didn't flag any "non-whitelisted file"
upvoted 2 times
mattlai
8 months, 2 weeks ago
zero day does not necessarily need a file to execute
upvoted 2 times
...
...
...
jeremy13
1 year ago
Selected Answer: A
A. File-less malware 312-50v11 Q164 https://www.trellix.com/en-us/security-awareness/ransomware/what-is-fileless-malware.html
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...