New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-38 Exam - Topic 8 Question 80 Discussion

Actual exam question for Eccouncil's 312-38 exam
Question #: 80
Topic #: 8
[All 312-38 Questions]

Which of the following NIST incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?

Show Suggested Answer Hide Answer
Suggested Answer: A

According to NIST guidelines, the incident category that includes activities seeking to access or identify a federal agency computer, open ports, protocols, services, or any combination thereof for later exploitation is categorized as 'Scans/Probes/Attempted Access'. This category encompasses any unauthorized attempts to access systems, networks, or data, which may include scanning for vulnerabilities or probing to discover open ports and services.


Contribute your Thoughts:

0/2000 characters
Billy
3 months ago
Really? I thought it could be C, improper usage sounds like it fits too.
upvoted 0 times
...
Queenie
3 months ago
A makes the most sense, no doubt!
upvoted 0 times
...
Oretha
3 months ago
Wait, are we sure it’s not B? Malicious code seems relevant too.
upvoted 0 times
...
Johanna
4 months ago
I agree, A is the right choice.
upvoted 0 times
...
Dona
4 months ago
Definitely A, that's what scanning is all about!
upvoted 0 times
...
Lenna
4 months ago
I'm leaning towards A as well, but I wonder if it could be B since malicious code can also involve probing. It's hard to remember the exact definitions!
upvoted 0 times
...
Celestine
4 months ago
I want to say it's A too, but I keep second-guessing myself. The definitions can be tricky, especially when it comes to distinguishing between scans and actual attacks.
upvoted 0 times
...
Alise
4 months ago
I feel like I've seen a similar question before, and I think it was about identifying weaknesses in systems. A sounds familiar, but I could be mixing it up with something else.
upvoted 0 times
...
Bette
5 months ago
I think the answer might be A, but I'm not completely sure. I remember something about scans being related to probing for vulnerabilities.
upvoted 0 times
...
Vinnie
5 months ago
Okay, I think I've got this. The category that best fits the description is Scans/Probes/Attempted Access. I'm confident that's the right answer.
upvoted 0 times
...
Rochell
5 months ago
I'm a bit confused by the wording of the question. I'll need to re-read it a few times to make sure I understand what they're asking.
upvoted 0 times
...
Lauran
5 months ago
The key here is to focus on the specific details in the question about accessing federal agency computers and identifying open ports or protocols. That should help me determine the right category.
upvoted 0 times
...
Brynn
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to carefully read through the options and think it through.
upvoted 0 times
...
Malcom
5 months ago
This question seems straightforward, I'm pretty confident I can identify the correct NIST incident category.
upvoted 0 times
...
Valene
5 months ago
Hmm, I'm a bit unsure about this one. I know identifying responsible parties is important, but I'm not sure if that's a top priority during the recovery phase. I'll have to think this through carefully.
upvoted 0 times
...
Elinore
5 months ago
This is a good question to test our understanding of regression testing. I'll make sure to consider each option and eliminate the ones that are clearly false.
upvoted 0 times
...
Arlyne
5 months ago
I'm pretty confident the answer is C. The policy applies when the image is built and when the container is started.
upvoted 0 times
...
Serina
5 months ago
The management console and log analysis tool don't seem like they would be the primary source of execution burden. I'm leaning towards the load generator or monitoring tool as the answer.
upvoted 0 times
...
Allene
2 years ago
Interesting point, But I still think A) Scans/Probes/Attempted Access fits better.
upvoted 0 times
...
Dorinda
2 years ago
I'm leaning towards B) Malicious code actually. It could also be a form of attempted access.
upvoted 0 times
...
Margurite
2 years ago
I agree with Scans/Probes/Attempted Access makes sense for that scenario.
upvoted 0 times
...
Allene
2 years ago
I think the answer is A) Scans/Probes/Attempted Access.
upvoted 0 times
...
Alline
2 years ago
Good to know. Thanks for clarifying.
upvoted 0 times
...
Alexia
2 years ago
That's correct. Scans/Probes/Attempted Access is the category for that activity.
upvoted 0 times
...
Alline
2 years ago
A) Scans/Probes/Attempted Access
upvoted 0 times
...

Save Cancel