Your company has been receiving regular alerts from its IDS about potential intrusions. On further investigation, you notice that these alerts have been false positives triggered by certain goodware files. In response, you are planning to enhance the IDS with YARA rules, reducing these false positives while improving the detection of real threats. Based on the scenario and the principles of YARA and IDS, which of the following strategies would best serve your purpose? A. Writing YARA rules specifically to identify the goodware files triggering false positives B. Implementing YARA rules that focus solely on known malware signatures C. Creating YARA rules to examine only the private database for intrusions D. Incorporating YARA rules to detect patterns in all files regardless of their nature A Correct Answer: A This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer