Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 221 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 221
Topic #: 1
[All 312-50v11 Questions]

Attacker Steve targeted an organization's network with the aim of redirecting the company's web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities in the DNS server software and modified the original IP address of the target website to that of a fake website.
What is the technique employed by Steve to gather information for identity theft?

  • A. Pharming
  • B. Skimming
  • C. Pretexting
  • D. Wardriving
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
[Removed]
Highly Voted 2 years, 7 months ago
A: Pharming Pharming is a social engineering technique in which the attacker executes malicious programs on a victim’s computer or server, and when the victim enters any URL or domain name, it automatically redirects the victim’s traffic to an attacker-controlled website. This attack is also known as “Phishing without a Lure.” The attacker steals confidential information like credentials, banking details, and other information related to web-based services.
upvoted 9 times
dinonino
1 year, 7 months ago
You're right. Skimming refers to stealing credit or debit card numbers by using special storage devices called skimmers or wedges when processing the card. Pretexting Fraudsters may impersonate executives from financial institutions, telephone companies, and other businesses. They rely on “smooth-talking” and win the trust of an individual to reveal sensitive information.
upvoted 3 times
...
...
GummyBear95
Most Recent 1 year, 1 month ago
Got this question on the exam 21.02.23
upvoted 2 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: A
Computer-based Social Engineering: Phishing - Pharming The attacker redirects web traffic to a fraudulent website by installing a malicious program on a personal computer or server. Also known as “phishing without a lure”, and performed by using DNS Cache Poisoning or Host File Modification. (P.1239/1223)
upvoted 3 times
...
KruHacker01
2 years, 2 months ago
Selected Answer: A
The attacker redirects web traffic to a fraudulent website by installing a malicious program on a personal computer or server Also known as “phishing without a lure”, and performed by using DNS Cache Poisoning or Host File Modification
upvoted 1 times
...
ANDRESCB1988
2 years, 9 months ago
correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...