nerdexam
EC-CouncilEC-Council

212-82 · Question #154

212-82 Question #154: Real Exam Question with Answer & Explanation

Sign in or unlock 212-82 to reveal the answer and full explanation for question #154. The question stem and answer options stay visible for context.

Submitted by tunde_lagos· Mar 6, 2026Application Security for Cloud

Question

An international bank recently discovered a security breach in its transaction processing system. The breach involved a sophisticated malware that not only bypassed the standard antivirus software but also remained undetected by the intrusion detection systems for months. The malware was programmed to intermittently alter transaction values and transfer small amounts to a foreign account, making detection challenging due to the subtlety of its actions. After a thorough investigation, cybersecurity experts identified the nature of this malware. Which of the following best describes the type of malware used in this breach?

Options

  • ARansomware, encrypting transaction data to extort money from the bank
  • Bpresenting itself as legitimate software while performing malicious transactions
  • CSpyware, gathering sensitive information about the bank's transactions and customers Rootki'
  • Dembedding itself deeply in the system to manipulate transaction processes

Unlock 212-82 to see the answer

You've previewed enough free 212-82 questions. Unlock 212-82 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Malware Analysis#Rootkits#Application Attacks#Cybersecurity Threats
Full 212-82 PracticeBrowse All 212-82 Questions