exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 219 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 219
Topic #: 1
[All 312-50v11 Questions]

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection.
Identify the behavior of the adversary in the above scenario.

  • A. Unspecified proxy activities
  • B. Use of command-line interface
  • C. Data staging
  • D. Use of DNS tunneling
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
beowolf
Highly Voted 2 years, 10 months ago
Answer is correct. A. DNS tunneling is obfuscating malicious traffic in legitimate traffic.
upvoted 9 times
...
Wolfgano
Highly Voted 2 years, 10 months ago
A. Unspecified Proxy Activities Correction, the correct answer is A.
upvoted 6 times
...
GodOfThunder
Most Recent 8 months ago
Answer A: An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection.
upvoted 1 times
...
MH2
8 months ago
Selected Answer: A
An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection. Security professionals can find unspecified domains by checking the data feeds that are generated by those domains. CEH pg14
upvoted 1 times
...
victorfs
1 year ago
Selected Answer: A
The correct option is A. Unspecified proxy activities
upvoted 1 times
...
hardinxcore
1 year, 4 months ago
Answer is A: Unspecified Proxy Activities An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection. Security professionals can find unspecified domains by checking the data feeds that are generated by those domains. Using this data feed, the security professionals can also find any malicious files downloaded and the unsolicited communication with the outside network based on the domains
upvoted 2 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: A
Adversary Behavioral Identification Adversary behavioral identification involves the identification of the common methods or techniques followed by an adversary to launch attacks on or to penetrate an organization’s network.It gives the security professionals insight into upcoming threats and exploits. 3.Unspecified Proxy Activities - An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection. (P.38/22)
upvoted 4 times
...
JackyLai88
1 year, 7 months ago
Selected Answer: A
A proxy server acts as a gateway between you and therefore the internet. It's an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy counting on your use case, needs, or company policy.If you're employing a proxy server, internet traffic flows through the proxy server on its thanks to the address you requested. A proxy server is essentially a computer on the web with its own IP address that your computer knows. once you send an internet request, your request goes to the proxy server first. The proxy server then makes your web request on your behalf, collects the response from the online server, and forwards you the online page data so you'll see the page in your browser.
upvoted 1 times
...
king777
1 year, 8 months ago
Selected Answer: A
A is the answer for sure.
upvoted 2 times
...
napstervk
1 year, 8 months ago
the correct answer is A
upvoted 1 times
...
flinux
1 year, 8 months ago
Selected Answer: A
the correct answer is A
upvoted 1 times
...
Ridey22
2 years, 2 months ago
Selected Answer: A
Correct Answer: A A proxy server acts as a gateway between you and therefore the internet. It's an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy counting on your use case, needs, or company policy.If you're employing a proxy server, internet traffic flows through the proxy server on its thanks to the address you requested. A proxy server is essentially a computer on the web with its own IP address that your computer knows. once you send an internet request, your request goes to the proxy server first. The proxy server then makes your web request on your behalf, collects the response from the online server, and forwards you the online page data so you'll see the page in your browser.
upvoted 1 times
...
Novmejst
2 years, 5 months ago
A. Unspecified proxy activities - Unspecified Proxy Activities: An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection. Security professionals can find unspecified domains by checking the data feeds that are generated by those domains. Using this data feed, the security professionals can also find any malicious files downloaded and the unsolicited communication with the outside network based on the domains.
upvoted 3 times
...
blacksheep6r
2 years, 7 months ago
also from the CEH manual... Use of Command-Line Interface On gaining access to the target system, an adversary can make use of the command-line interface to interact with the target system, browse the files, read file content, modify file content, create new accounts, connect to the remote system, and download and install malicious code. Security professionals can identify this behavior of an adversary by checking the logs for process ID, processes having arbitrary letters and numbers, and malicious files downloaded from the Internet.
upvoted 2 times
...
blacksheep6r
2 years, 7 months ago
Unspecified Proxy Activities An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection. Security professionals can find unspecified domains by checking the data feeds that are generated by those domains. Using this data feed, the security professionals can also find any malicious files downloaded and the unsolicited communication with the outside network based on the domains.
upvoted 1 times
...
blacksheep6r
2 years, 7 months ago
A- Unspecified Proxy Activities An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection. Security professionals can find unspecified domains by checking the data feeds that are generated by those domains. Using this data feed, the security professionals can also find any malicious files downloaded and the unsolicited communication with the outside network based on the domains CEHv11 manual pg 38
upvoted 4 times
...
ANDRESCB1988
2 years, 9 months ago
correct
upvoted 2 times
ANDRESCB1988
2 years, 9 months ago
the answer is A
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago