exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 95 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 95
Topic #: 1
[All 312-50v11 Questions]

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the provider's environment?

  • A. Behavioral based
  • B. Heuristics based
  • C. Honeypot based
  • D. Cloud based
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
peace_iron
Highly Voted 2 years, 6 months ago
The correct answer is Cloud-based. Cloud-based detection identifies malware by collecting data from protected computers while analyzing it on the provider's infrastructure, instead of performing the analysis locally. https://zeltser.com/how-antivirus-software-works/
upvoted 16 times
...
rickcoyw
Most Recent 1 year ago
Selected Answer: D
Cloud Based, antivirus software leverages the power of cloud computing and centralized analysis to identify malware. Instead of analyzing files locally on individual systems, the files are sent to the provider's cloud environment for analysis.
upvoted 1 times
...
victorfs
1 year, 2 months ago
Selected Answer: D
The option correct is D: Cloud-based
upvoted 1 times
...
qovert
1 year, 3 months ago
Answer: D Cloud-based detection techniques in antivirus software involve collecting data from multiple protected systems and analyzing it in the provider's environment instead of locally on individual systems. This approach enables rapid response to new malware threats and reduces the computational overhead on local machines. By leveraging the power of cloud infrastructure, antivirus providers can analyze large volumes of data and deploy updates to their users more efficiently.
upvoted 2 times
...
Flav_man
1 year, 4 months ago
Selected Answer: D
it's D
upvoted 2 times
...
josevirtual
1 year, 8 months ago
Selected Answer: D
Cloud-based, it is done in cloud, not on-premise
upvoted 2 times
...
baskan
1 year, 11 months ago
D. Cloud base .
upvoted 1 times
...
noblethic
2 years ago
Selected Answer: D
The actual analysis is performed in the provider's cloud.
upvoted 2 times
...
noblethic
2 years ago
Selected Answer: C
C. The actual analysis is performed in the provider's cloud.
upvoted 1 times
Grey975
1 year, 11 months ago
That is answer D.
upvoted 3 times
...
...
cazzobsb
2 years, 3 months ago
Selected Answer: D
Correct
upvoted 1 times
...
iqrahaq
2 years, 3 months ago
Selected Answer: D
If you google, a lot of the information points to Cloud-based.
upvoted 2 times
...
Jong1
2 years, 3 months ago
Selected Answer: D
Cisco as a solution for this DNA cloud-based data platform where Machine Learning models are built and analyzed for your specific network environment.
upvoted 1 times
...
Huinen
2 years, 5 months ago
Selected Answer: A
It sound like a xRD to me, so i will say A.
upvoted 2 times
...
martco
2 years, 8 months ago
hm. poor question...IDPS is all a blur nowadays..AI + ML yadda so I wouldn't get hung up on heuristics etc. best guess the only clear part of this question as I read it is WHERE is the analysis taking place? = the vendors (provider environment) like say PaloAlto etc. (which might have been exotic when this question was written)
upvoted 1 times
...
idowh
2 years, 8 months ago
SO what is the answer now A or D
upvoted 1 times
...
blacksheep6r
2 years, 9 months ago
A tcptrace is a free and open-source tool for analyzing TCP dump files.[1][2][3] It accepts as input files produced by packet-capture programs, including tcpdump, Wireshark, and snoop. tcptrace can produce several different types of output containing information on each connection seen, such as elapsed time, bytes and segments sent and received, retransmissions, round trip times, window advertisements, and throughput. It can also produce graphs for further analysis. As of version 5, minimal UDP processing has been implemented in addition to the TCP capabilities. https://en.wikipedia.org/wiki/Tcptrace
upvoted 1 times
RoVasq3
2 years, 7 months ago
does this answer has something to do with the actual question?
upvoted 3 times
...
...
Mr_Gray
2 years, 9 months ago
what makes this correct? do you have any basis? why not Hueristic since that detection is smart enough to think.
upvoted 1 times
spydog
2 years, 9 months ago
The key here is that question saying the "analysis of the file is done on provider environment", not locally on the system. Heuristic is done locally.
upvoted 8 times
Mr_Gray
2 years, 9 months ago
good point. Thank you spydog
upvoted 2 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...