What is the term for a category of network threats where the attacker gains unauthorized access and remains inside the network undetected for a long period?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

What is the term for a category of network threats where the attacker gains unauthorized access and remains inside the network undetected for a long period?

Explanation:
Advanced persistent threats describe attackers who gain unauthorized access and stay inside the network undetected for an extended period. The “advanced” part refers to using sophisticated techniques to break in, evade defenses, and maintain a foothold, while the “persistent” part means they remain in the environment for a long time, often quietly, to monitor, move laterally, or exfiltrate data over time. This combination of stealthy, long-term presence defines the threat model and is what makes it the correct fit for the scenario. In contrast, general malicious code covers malware in general without implying a sustained, targeted campaign; a crypter is just a tool used to hide payloads, and a dropper’s role is to install malware rather than describe an ongoing, covert operation.

Advanced persistent threats describe attackers who gain unauthorized access and stay inside the network undetected for an extended period. The “advanced” part refers to using sophisticated techniques to break in, evade defenses, and maintain a foothold, while the “persistent” part means they remain in the environment for a long time, often quietly, to monitor, move laterally, or exfiltrate data over time. This combination of stealthy, long-term presence defines the threat model and is what makes it the correct fit for the scenario. In contrast, general malicious code covers malware in general without implying a sustained, targeted campaign; a crypter is just a tool used to hide payloads, and a dropper’s role is to install malware rather than describe an ongoing, covert operation.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy