exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 141 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 141
Topic #: 1
[All 312-50v11 Questions]

Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the target's MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her
MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization.
Which of the following cloud attacks did Alice perform in the above scenario?

  • A. Cloud cryptojacking
  • B. Man-in-the-cloud (MITC) attack
  • C. Cloud hopper attack
  • D. Cloudborne attack
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Scryptic
Highly Voted 3 years, 3 months ago
The attackers behind Cloud Hopper were able to get hold of security credentials by sending spoof emails to workers at cloud businesses. They then leveraged the access these “spear-phishing” attacks gave them to install malware that let them steal security credentials and conduct reconnaissance
upvoted 17 times
...
Daniel8660
Highly Voted 2 years, 2 months ago
Selected Answer: C
Cloud Attacks: Cloud Hopper Attack Cloud hopper attacks are triggered at managed service providers (MSPs) and their customers. Once the attack is successfully implemented, attackers can gain remote access to the intellectual property and critical information of the target MSP and its global users/customers. Attackers initiate spear-phishing emails with custom-made malware to compromise the accounts of staff or cloud service firms to obtain confidential information. (P.2903/2887)
upvoted 7 times
...
huyan
Most Recent 11 months, 2 weeks ago
This question was on my test on 12/20/23
upvoted 1 times
...
CHCHCHC
1 year, 4 months ago
Selected Answer: C
Cloud hopper attacks are triggered at managed service providers (MSPs) and their customers. Once the attack is successfully implemented, attackers can gain remote access to the intellectual property and critical information of the target MSP and its global users/customers. Attackers also move laterally in the network from one system to another in the cloud environment to gain further access to sensitive data pertaining to the industrial entities, such as manufacturing, government bodies, healthcare, and finance. Module 19 Page 1992
upvoted 1 times
...
MyName7
2 years, 3 months ago
Selected Answer: C
Cloud Hopper attacks are triggered at the Managed Service Providers (MSPs) and their users. Attackers initiate spear-phishing emails with custom made malware to compromise the accounts of staff o cloud service firms to obtain confidential information.
upvoted 3 times
MyName7
2 years, 3 months ago
of staff OR* cloud service
upvoted 1 times
...
...
AleksVAnd
2 years, 9 months ago
Correct. Page 2903, Module 19 Cloud Computing: Cloud Hopper Attack. The "hop"/jump part comes from the lateral movement after the breach.
upvoted 4 times
...
martco
3 years, 1 month ago
https://www.trendmicro.com/vinfo/pl/security/news/cyber-attacks/operation-cloud-hopper-what-you-need-to-know
upvoted 2 times
...
sairmanzur
3 years, 2 months ago
Why not B
upvoted 1 times
...
ANDRESCB1988
3 years, 5 months ago
correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...