Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 49 Topic 5 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 49 Topic 5 Discussion

312-50v13 Exam Topic 5 Question 49 Discussion:
Question #: 49
Topic #: 5

After a breach, investigators discover attackers used modified legitimate system utilities and a Windows service to persist undetected and harvest credentials. What key step would best protect against similar future attacks?


A.

Disable unused ports and restrict outbound firewall traffic


B.

Perform weekly backups and store them off-site


C.

Ensure antivirus and firewall software are up to date


D.

Monitor file hashes of critical executables for unauthorized changes


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.