An organization has been experiencing intrusion attempts despite deploying an Intrusion Detection System (IDS) and Firewalls. As a Certi ed Ethical Hacker, you are asked to reinforce the intrusion detection process and recommend a better rule-based approach. The IDS uses Snort rules and the new recommended tool should be able to complement it. You suggest using YARA rules with an additional tool for rule generation. Which of the following tools would be the best choice for this purpose and why? A. yarGen - Because it generates YARA rules from strings identified in malware files while removing strings that also appear in goodware files B. Koodous - Because it combines social networking with antivirus signatures and YARA rules to detect malware C. YaraRET - Because it helps in reverse engineering Trojans to generate YARA rules D. AutoYara - Because it automates the generation of YARA rules from a set of malicious and benign files Correct Answer: A This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer