Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 379 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 379
Topic #: 1
[All 312-50v11 Questions]

Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit.
What is the technique used by Jack to launch the fileless malware on the target systems?

  • A. In-memory exploits
  • B. Legitimate applications
  • C. Script-based injection
  • D. Phishing
Show Suggested Answer Hide Answer
Suggested Answer: TMD 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
YourFriendlyNeighborhoodSpider
5 months, 2 weeks ago
Selected Answer: C
ChatGPT: Answer: C. Script-based injection Explanation: The technique used by Jack to launch the fileless malware on the target systems is known as script-based injection. Here's why: Script-based injection (option C): In this scenario, Jack used fraudulent emails containing malicious links. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit. The term "script-based" refers to the use of scripts or code embedded in a web page or email to initiate an attack. In this case, the script is used to exploit vulnerabilities in Flash and deliver the fileless malware. Phishing (option D): Phishing is a broader term that encompasses various deceptive techniques to trick individuals into divulging sensitive information. In this scenario, while there is an element of deception (fraudulent emails), the specific technique used for the malware injection is script-based.
upvoted 1 times
...
Vincent_Lu
7 months, 2 weeks ago
Selected Answer: D
Phishing
upvoted 1 times
...
ujjwal247
11 months, 1 week ago
Selected Answer: D
Phishing
upvoted 1 times
...
victorfs
11 months, 2 weeks ago
Selected Answer: D
The correct option is D. Phishing
upvoted 1 times
...
josevirtual
1 year, 4 months ago
Selected Answer: D
"What is the technique?" In memory exploits is not a technique, I go with "phishing"
upvoted 1 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: D
Launching Fileless Malware through Phishing Attackers commonly use social engineering techniques such as phishing to spread fileless malware to the target systems. Fileless malware exploits vulnerabilities in system tools to load and run malicious payloads on the victim’s machine to compromise the sensitive information stored in the process memory. (P.978/962)
upvoted 1 times
...
ebuAkif
1 year, 6 months ago
Selected Answer: D
if it asks technique then it is phishing. "Attackers commonly use social engineering techniques such as phishing to spread fileless malware to the target systems Fileless malware exploits vulnerabilities in system tools to load and run malicious payloads on the victim’s machine to compromise the sensitive information stored in the process memory Point "
upvoted 1 times
...
robullo
1 year, 9 months ago
Selected Answer: C
For me is C, also because they want to know what is the technique used, so phising it's the initial one, in-memory exploits it's the resoult and so guys if you check page 960 you find the technique.
upvoted 1 times
...
Victor83516
1 year, 9 months ago
Selected Answer: D
D is correct. no doubt.
upvoted 1 times
...
la144
2 years ago
Selected Answer: D
D is the correct one. According CEH v.11 page 962: Launching Fileless Malware through Phishing Attackers commonly use social engineering techniques such as phishing to spread fileless malware to the target systems. They send spam emails embedded with malicious links to the victim. When the victim clicks on the link, he/she will be directed to a fraudulent website that automatically loads Flash and triggers the exploit.
upvoted 1 times
...
Crash_Override
2 years, 2 months ago
Selected Answer: A
"What is the technique used by Jack to launch the fileless malware on the target systems?"
upvoted 2 times
...
Amios1
2 years, 3 months ago
Selected Answer: D
This is a bit confusing. I will go with D
upvoted 1 times
...
egz21
2 years, 3 months ago
Selected Answer: D
answers is D) Phishing
upvoted 1 times
...
egz21
2 years, 3 months ago
pishing is the correct answer!!
upvoted 1 times
...
RS_s
2 years, 3 months ago
Selected Answer: D
Phishing was used to launch the attack here.
upvoted 1 times
...
eazy99
2 years, 4 months ago
Selected Answer: D
“What is the technique used by Jack to launch the fileless malware on the target systems?” It didn’t ask what type of exploit, or how does this exploit work. It’s simply asking what did he do so he can deliver his malicious file? He emailed it, they clicked, and the fileless malware was launched on their machine. Would he be able to launch his malicious file without Phishing? Absolutely not, so we don’t really care what type of vulnerability he used, we care about how was he able to do it. For that reason I go for D. Phishing. Don’t overthink it.
upvoted 3 times
...
Qwertyzloy
2 years, 4 months ago
it's D. Phishing M.7 p.962
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...