nerdexam
EC-CouncilEC-Council

312-49 · Question #349

312-49 Question #349: Real Exam Question with Answer & Explanation

The correct answer is C: Zombie. In cybersecurity, an 'idle' system is referred to as a 'zombie.' This term is used in two contexts: (1) a zombie is a compromised machine that has been secretly enslaved into a botnet to carry out attacks on behalf of an attacker, and (2) in the context of idle scanning (a stealt

Submitted by wei.xz· Apr 18, 2026Malware Forensics

Question

An "idle" system is also referred to as what?

Options

  • APC not connected to the Internet
  • BPC not being used
  • CZombie
  • DBot

Explanation

In cybersecurity, an 'idle' system is referred to as a 'zombie.' This term is used in two contexts: (1) a zombie is a compromised machine that has been secretly enslaved into a botnet to carry out attacks on behalf of an attacker, and (2) in the context of idle scanning (a stealthy port scanning technique), an idle/zombie host is one with predictable IP ID sequences that an attacker exploits to perform anonymous scans. A 'bot' (D) is closely related but refers to the malicious software running on the zombie, not the host itself.

Topics

#Malware#Botnet#Compromised Systems#Cybersecurity Terminology

Community Discussion

No community discussion yet for this question.

Full 312-49 PracticeBrowse All 312-49 Questions