exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 32 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 32
Topic #: 1
[All 312-50v13 Questions]

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine.
Which of the following techniques is used by Joel in the above scenario?

  • A. Watering hole attack
  • B. DNS rebinding attack
  • C. MarioNet attack
  • D. Clickjacking attack
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mulekule
1 month ago
Selected Answer: A
Watering hole attack is a cyberattack targeting a particular organization, in which malware is installed on a website or websites regularly visited by the organization's members in order to infect computers used within the organization itself.
upvoted 1 times
...
Cysaplus2023
1 month, 3 weeks ago
Selected Answer: A
-Network-Based Scanner: Network-based scanners are those that interact only with the real machine where they reside and give the report to the same machine after scanning. -Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. -Proxy Scanner: Proxy scanners are the network-based scanners that can scan networks from any machine on the network. -Cluster scanner: Cluster scanners are similar to proxy scanners, but they can simultaneously perform two or more scans on different machines in the network p.585
upvoted 1 times
...
Rangnarok
3 months, 3 weeks ago
Selected Answer: A
Module 14 - page 1961 In a watering hole attack, the attacker identifies the kind of websites frequently surfed by a target company/individual and tests these websites to identify any possible vulnerabilities
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago