nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #494

CERTIFIED-IN-CYBERSECURITY Question #494: Real Exam Question with Answer & Explanation

The correct answer is B: APT. Current anti-malware solutions typically do not detect Advanced Persistent Threats (APTs). APTs are complex, stealthy, and persistent attacks that often target specific organizations or entities and are carried out by well-resourced and skilled adversaries such as nation-state ac

Security Operations

Question

The latest anti-malware solutions have expanded their detection capabilities to include more than just viruses. Which of the following is NOT typically detected by modern anti-malware?

Options

  • ARootkits
  • BAPT
  • CSpyware
  • DRansomware

Explanation

Current anti-malware solutions typically do not detect Advanced Persistent Threats (APTs). APTs are complex, stealthy, and persistent attacks that often target specific organizations or entities and are carried out by well-resourced and skilled adversaries such as nation-state actors. For example, an APT might involve a series of coordinated attacks over a long period of time to steal sensitive information from a government agency. These attacks are sophisticated and often use zero-day vulnerabilities, making them difficult to detect with traditional anti-malware solutions. The other options are incorrect because they all refer to common types of malware that modern anti- malware solutions are designed to detect and neutralize. Modern anti-malware solutions are designed to detect and neutralize a variety of threats, including ransomware, spyware, and rootkits. Ransomware is malware that encrypts user data and demands a ransom for its release. Spyware is software that collects information about a user's activities without their knowledge or consent. Rootkits are malware that provides privileged access to a computer, often while hiding

Topics

#Anti-malware#Malware types#APT (Advanced Persistent Threat)#Security controls

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions