Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 71 Topic 8 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 71 Topic 8 Discussion

312-50v13 Exam Topic 8 Question 71 Discussion:
Question #: 71
Topic #: 8

During a late-night shift at IronWave Logistics in Seattle, cybersecurity analyst Marcus Chen notices a pattern of high-port outbound traffic from over a dozen internal machines to a previously unseen external IP. Each system had recently received a disguised shipping report, which, when opened, initiated a process that spread autonomously to other workstations using shared folders and stolen credentials. Upon investigation, Marcus discovers that the machines now contain hidden executables that silently accept remote instructions and occasionally trigger coordinated background tasks. The compromised endpoints are behaving like zombies, and malware analysts confirm that the payload used worm-like propagation to deliver a backdoor component across the network.

Which is the most likely objective behind this attack?


A.

To exfiltrate sensitive information and tracking data


B.

To execute a ransomware payload and encrypt all data


C.

To establish a botnet for remote command and control


D.

To deploy a Remote Access Trojan (RAT) for stealthy surveillance


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.