Boost your skills for the Ethical Hacking Test. Explore diverse questions, insightful tips, and detailed explanations. Prepare effectively for your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of adversary behavior was detected if a security professional sees downloaded malicious files?

  1. Unspecified proxy activities

  2. Credential stuffing

  3. Phishing attempts

  4. Denial-of-Service attacks

The correct answer is: Unspecified proxy activities

The presence of downloaded malicious files indicates suspicious or adversarial activity that is typically indicative of an unspecified proxy's actions. This category of behavior suggests that an unauthorized party may be accessing the network or system resources in a stealthy manner, possibly using compromised credentials or exploits to manipulate the environment without direct interactions that would expose their activities. This kind of behavior often involves the use of proxy services to mask the true origin of the activity, allowing attackers to download files without revealing their identities or intentions. Such downloads could involve malware or data exfiltration efforts. This contrasts sharply with the other listed options, which describe more specific types of attacks or incidents that have distinctive signatures or behaviors. For instance, credential stuffing involves using stolen credentials to gain access to accounts, phishing attempts focus on tricking users into revealing sensitive information, and denial-of-service attacks aim to disrupt the availability of a service by overwhelming it with traffic. Each of these activities has its own set of indicators that differ significantly from the general proxy-like behavior seen when malicious files are downloaded.