exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 180 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 180
Topic #: 1
[All 312-50v11 Questions]

Don, a student, came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app.
What is the attack performed on Don in the above scenario?

  • A. SIM card attack
  • B. Clickjacking
  • C. SMS phishing attack
  • D. Agent Smith attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
americaman80
Highly Voted 2 years ago
D is correct. Source: https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/
upvoted 18 times
...
Daniel8660
Highly Voted 6 months, 3 weeks ago
Selected Answer: D
Agent Smith Attack - is carried out by persuading the victim to install a malicious app designed and published by an attacker.The malicious app replaces legitimate apps, produces a huge volume of advertisements on the victim’s device through the infected app. (P.2415/2399)
upvoted 6 times
...
baskan
Most Recent 7 months ago
Selected Answer: D
D is correct
upvoted 1 times
...
baskan
7 months ago
Selected Answer: B
B is Correct.
upvoted 1 times
baskan
7 months ago
Sorry, Please Delete my comment. Moderator.
upvoted 3 times
...
...
Oliverotuns
1 year, 3 months ago
Correct
upvoted 1 times
...
DumHeaD
1 year, 4 months ago
Didn't we all watch the matrix??
upvoted 2 times
...
uzey
1 year, 4 months ago
Selected Answer: D
Agent Smith attacks are carried out by luring victims into downloading and installing malicious apps designed and published by attackers in the form of games, photo editors, or other attractive tools from third-party app stores such as 9Apps. Once the user has installed the app, the core malicious code inside the application infects or replaces the legitimate apps in the victim’s mobile device C&C commands. The deceptive application replaces legitimate apps such as WhatsApp, SHAREit, and MX Player with similar infected versions. The application sometimes also appears to be an authentic Google product such as Google Updater or Themes. The attacker then produces a massive volume of irrelevant and fraudulent advertisements on the victim’s device through the infected app for financial gain. Attackers exploit these apps to steal critical information such as personal information, credentials, and bank details, from the victim’s mobile device through C&C commands
upvoted 6 times
...
ANDRESCB1988
1 year, 9 months ago
option D is correct, Agent Smith Attack
upvoted 5 times
...
Kamal_SriLanka
1 year, 9 months ago
Answer is C
upvoted 1 times
...
Joker20
2 years ago
B Clickjaking
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago