{"id":305,"date":"2022-02-25T19:43:18","date_gmt":"2022-02-25T19:36:52","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question164\/"},"modified":"2022-02-25T19:46:25","modified_gmt":"2022-02-25T19:46:25","slug":"certified-ethical-hacker-v11-312-50v11-question164","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question164\/","title":{"rendered":"Certified Ethical Hacker v11 312-50v11 &#8211; Question164"},"content":{"rendered":"<div class=\"question\">Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS\/IPS has not reported on any non-whitelisted programs.<br \/>\nWhat type of malware did the attacker use to bypass the company&#039;s application whitelisting?<br \/><strong><br \/>A.<\/strong> File-less malware<br \/><strong>B.<\/strong> Zero-day malware<br \/><strong>C.<\/strong> Phishing malware<br \/><strong>D.<\/strong> Logic bomb malware<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS\/IPS has not reported on any non-whitelisted programs. What type of malware did the attacker [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,167],"class_list":["post-305","post","type-post","status-publish","format-standard","hentry","category-certified-ethical-hacker-v11-312-50v11","tag-certified-ethical-hacker-v11-312-50v11","tag-question-164"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/305\/revisions"}],"predecessor-version":[{"id":532,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/305\/revisions\/532"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/media?parent=305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/categories?post=305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/tags?post=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}