exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 227 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 227
Topic #: 1
[All 312-50v11 Questions]

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.
Which of the following attack techniques is used by John?

  • A. Insider threat
  • B. Diversion theft
  • C. Spear-phishing sites
  • D. Advanced persistent threat
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kamal_SriLanka
Highly Voted 2 years, 6 months ago
The answer is correct APT will remain in the network for a longer time without a trace
upvoted 8 times
...
Cokamaniako
Most Recent 11 months, 2 weeks ago
Answer D nced persistent threat is defined as a type of network attack whereby an attacker gains unauthorized access to a target network and remains in the network without being detected for a long time. The word “advanced” signifies the use of techniques to exploit the underlying vulnerabilities in the system. The word “persistent” signifies the external command-and-control (C&C) system that continuously extracts the data and monitors the victim’s network. The word “threat” signifies human involvement in coordination. APT attacks are highly sophisticated attacks whereby an attacker uses well-crafted malicious code along with a combination of multiple zero-day exploits to gain access to the target network.
upvoted 1 times
...
Daniel8660
1 year, 3 months ago
Selected Answer: D
Advanced Persistent Threats (APTs) Advanced persistent threats (APTs) are defined as a type of network attack, where an attacker gains unauthorized access to a target network and remains undetected for a long period of time.Attacks is to obtain sensitive information rather than sabotaging the organization and its network. (P.865/849)
upvoted 2 times
...
ANDRESCB1988
2 years, 5 months ago
correct
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...