exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 46 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 46
Topic #: 1
[All 312-50v13 Questions]

Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

  • A. Scanning
  • B. Gaining access
  • C. Maintaining access
  • D. Reconnaissance
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
temp_acc
1 month, 1 week ago
Selected Answer: B
Both actions in the question aim to get into the target system or application: Infecting a system with malware = delivering a payload to gain control. Phishing to steal credentials = tricking users into giving access. These are techniques used to exploit a vulnerability and enter the system, which is exactly what happens during the "Gaining Access" phase in the ethical hacking methodology.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...