exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 359 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 359
Topic #: 1
[All 312-50v11 Questions]

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine.
Joel waits for the victim to access the infected web application so as to compromise the victim's machine.
Which of the following techniques is used by Joel in the above scenario?

  • A. Watering hole attack
  • B. DNS rebinding attack
  • C. MarioNet attack
  • D. Clickjacking attack
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
vamada
Highly Voted 2 years, 9 months ago
A - t is a type of unvalidated redirect attack whereby the attacker first identifies the most visited website of the target, determines the vulnerabilities in the website, injects malicious code into the vulnerable web application, and then waits for the victim to browse the website. Once the victim tries to access the website, the malicious code executes, infecting the victim.
upvoted 5 times
...
steffBarj
Most Recent 1 year ago
Nope --> D. Clickjacking attack /// CORRECT Correct answer is Click-jacking attack
upvoted 1 times
...
Daniel8660
1 year, 9 months ago
Selected Answer: A
Web Application Threats - Watering Hole Attack In a watering hole attack, the attacker identifies the kinds of websites a target company/individual frequently surfs and tests those particular websites to identify any possible vulnerabilities. Attacker injects malicious script/code into the web application that can redirect the webpage and download malware onto the victim machine. (P.1797/1781)
upvoted 2 times
...
KumaraRashu
2 years, 5 months ago
correct:What is a watering hole attack? A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's workplace.
upvoted 3 times
...
Amios1
2 years, 6 months ago
Selected Answer: A
correct
upvoted 2 times
...
jinjection
2 years, 10 months ago
Correct A
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...