exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 151 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 151
Topic #: 1
[All 312-50v11 Questions]

At what stage of the cyber kill chain theory model does data exfiltration occur?

  • A. Weaponization
  • B. Actions on objectives
  • C. Command and control
  • D. Installation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
americaman80
Highly Voted 3 years ago
B is the correct answer. Reference: https://www.logsign.com/blog/7-steps-of-cyber-kill-chain/#:~:text=The%20Cyber%20Kill%20Chain%20consists%20of%207%20steps%3A%20Reconnaissance%2C%20weaponization,attacker%20%2F%20intruder%20chooses%20their%20target.
upvoted 11 times
...
Daniel8660
Highly Voted 1 year, 6 months ago
Selected Answer: B
Actions on Objectives The adversary controls the victim’s system from a remote location and finally accomplishes their intended goals. The adversary gains access to confidential data, disrupts the services or network, or destroys the operational capability of the target by gaining access to its network and compromising more systems. Also, the adversary may use this as a launching point to perform other attacks. (P.32/16)
upvoted 5 times
...
MH2
Most Recent 8 months, 1 week ago
Selected Answer: C
The adversary creates a command and control channel, which establishes two-way communication between the victim’s system and adversary-controlled server to communicate and pass data back and forth. The adversaries implement techniques such as encryption to hide the presence of such channels. Using this channel, the adversary performs remote exploitation on the target system or network
upvoted 1 times
...
MH2
8 months, 1 week ago
Command and Control EC-Council's CEH book pg 26 The adversary creates a command and control channel, which establishes two-way communication between the victim’s system and adversary-controlled server to communicate and pass data back and forth. The adversaries implement techniques such as encryption to hide the presence of such channels. Using this channel, the adversary performs remote exploitation on the target system or network
upvoted 1 times
...
Bob_234
1 year, 1 month ago
Selected Answer: B
Actions on objectives (AOO) is the final stage of the Cyber Kill Chain, where the attacker achieves their ultimate objective. This could involve data theft, sabotage, or any other goal that the attacker had in mind when they initiated the attack. Command and Control (C2), on the other hand, is an earlier stage in the Cyber Kill Chain, where the attacker establishes communication with the compromised system or network to gain control and issue commands to carry out the attack. The C2 stage often involves the use of malware or other forms of malicious software to gain access to the targeted system or network.
upvoted 1 times
n7es1
1 year, 1 month ago
Hey buddy, can I reach out to you please? Discord or even twitter handle?
upvoted 1 times
...
...
josevirtual
1 year, 4 months ago
Selected Answer: B
Actions on objectives
upvoted 1 times
...
uday1985
1 year, 10 months ago
Actions on Objective: Intruder takes action to achieve their goals, such as data exfiltration, data destruction, or encryption for ransom. answer is correct
upvoted 1 times
...
cazzobsb
2 years, 1 month ago
Selected Answer: B
Correct
upvoted 1 times
...
tux_alket
2 years, 2 months ago
Selected Answer: B
Actions and Objectives
upvoted 1 times
...
spydog
2 years, 2 months ago
Selected Answer: B
Action on objective is the correct answer. Think about it - every attack has it purpose - to encrypt data, to steal/exfiltrate data. No one is attacking only to establish command and control. So the "objective" is to steal the data
upvoted 3 times
...
semselim
2 years, 2 months ago
Selected Answer: C
Command and control
upvoted 3 times
...
stephyfresh13
2 years, 5 months ago
Actions on Objective: Once the attacker / intruder gains persistent access, they finally take action to fullfil their purpose, such as encryption for ransom, data exfiltration or even data destruction.
upvoted 3 times
...
ANDRESCB1988
2 years, 9 months ago
correct
upvoted 4 times
marcoatv
1 year, 10 months ago
Hope you scored a 100, never missed a single question! Damn NPC
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago