Signature-based malware detection relies on a constantly updated database of known threat signatures to identify malicious files or activity. Without frequent updates, it becomes ineffective against newly emerging threats.
Question 2
What would allow a security team to inspect TLS encapsulated traffic?
Options:
A.
DHCP markings
B.
Decryption
C.
Port translation
D.
Traffic shaping
Answer:
B
Explanation:
Decryption is required to inspect TLS-encrypted traffic, allowing security tools (such as firewalls or intrusion prevention systems) to analyze the contents of the traffic for threats that would otherwise remain hidden within encrypted sessions.
Question 3
Which type of attack includes exfiltration of data as a primary objective?
Options:
A.
Advanced persistent threat
B.
Denial-of-service (DoS)
C.
Watering hole attack
D.
Cross-Site Scripting (XSS)
Answer:
A
Explanation:
An Advanced Persistent Threat (APT) is a long-term, targeted cyberattack where data exfiltration is often the primary objective. Attackers maintain a covert presence in the network to steal sensitive information over time.