Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 95 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 95
Topic #: 1
[All 312-50v11 Questions]

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the provider's environment?

  • A. Behavioral based
  • B. Heuristics based
  • C. Honeypot based
  • D. Cloud based
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
peace_iron
Highly Voted 2 years, 3 months ago
The correct answer is Cloud-based. Cloud-based detection identifies malware by collecting data from protected computers while analyzing it on the provider's infrastructure, instead of performing the analysis locally. https://zeltser.com/how-antivirus-software-works/
upvoted 16 times
...
rickcoyw
Most Recent 9 months, 3 weeks ago
Selected Answer: D
Cloud Based, antivirus software leverages the power of cloud computing and centralized analysis to identify malware. Instead of analyzing files locally on individual systems, the files are sent to the provider's cloud environment for analysis.
upvoted 1 times
...
victorfs
11 months, 3 weeks ago
Selected Answer: D
The option correct is D: Cloud-based
upvoted 1 times
...
qovert
1 year ago
Answer: D Cloud-based detection techniques in antivirus software involve collecting data from multiple protected systems and analyzing it in the provider's environment instead of locally on individual systems. This approach enables rapid response to new malware threats and reduces the computational overhead on local machines. By leveraging the power of cloud infrastructure, antivirus providers can analyze large volumes of data and deploy updates to their users more efficiently.
upvoted 2 times
...
Flav_man
1 year, 1 month ago
Selected Answer: D
it's D
upvoted 2 times
...
josevirtual
1 year, 5 months ago
Selected Answer: D
Cloud-based, it is done in cloud, not on-premise
upvoted 2 times
...
baskan
1 year, 8 months ago
D. Cloud base .
upvoted 1 times
...
noblethic
1 year, 9 months ago
Selected Answer: D
The actual analysis is performed in the provider's cloud.
upvoted 2 times
...
noblethic
1 year, 9 months ago
Selected Answer: C
C. The actual analysis is performed in the provider's cloud.
upvoted 1 times
Grey975
1 year, 8 months ago
That is answer D.
upvoted 3 times
...
...
cazzobsb
2 years ago
Selected Answer: D
Correct
upvoted 1 times
...
[Removed]
2 years ago
Selected Answer: D
Not done locally, instead, it is done in the provider's environment. This points to a Cloud-based IDS/IPS. Heuristic is still done locally, it is just behavioral-based.
upvoted 1 times
...
iqrahaq
2 years ago
Selected Answer: D
If you google, a lot of the information points to Cloud-based.
upvoted 2 times
...
Jong1
2 years ago
Selected Answer: D
Cisco as a solution for this DNA cloud-based data platform where Machine Learning models are built and analyzed for your specific network environment.
upvoted 1 times
...
Huinen
2 years, 2 months ago
Selected Answer: A
It sound like a xRD to me, so i will say A.
upvoted 2 times
...
martco
2 years, 5 months ago
hm. poor question...IDPS is all a blur nowadays..AI + ML yadda so I wouldn't get hung up on heuristics etc. best guess the only clear part of this question as I read it is WHERE is the analysis taking place? = the vendors (provider environment) like say PaloAlto etc. (which might have been exotic when this question was written)
upvoted 1 times
...
idowh
2 years, 5 months ago
SO what is the answer now A or D
upvoted 1 times
...
blacksheep6r
2 years, 6 months ago
A tcptrace is a free and open-source tool for analyzing TCP dump files.[1][2][3] It accepts as input files produced by packet-capture programs, including tcpdump, Wireshark, and snoop. tcptrace can produce several different types of output containing information on each connection seen, such as elapsed time, bytes and segments sent and received, retransmissions, round trip times, window advertisements, and throughput. It can also produce graphs for further analysis. As of version 5, minimal UDP processing has been implemented in addition to the TCP capabilities. https://en.wikipedia.org/wiki/Tcptrace
upvoted 1 times
RoVasq3
2 years, 4 months ago
does this answer has something to do with the actual question?
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...