Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 397 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 397
Topic #: 1
[All 312-50v11 Questions]

An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.
What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

  • A. Buffer overflow attack
  • B. Side-channel attack
  • C. Denial-of-service attack
  • D. HMI-based attack
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jinjection
Highly Voted 2 years, 6 months ago
Good luck everyone for the exam!
upvoted 52 times
...
Chaoticda
Highly Voted 2 years, 4 months ago
98% of the questions are from here, please do them again and again and score full marks for your CEH and all the best! Literally just do these 397 questions 4 - 5 times and i can gurantee you not only a pass, but a pretty damn high score! Please check discussions as some answers are not correct.
upvoted 39 times
...
steffBarj
Most Recent 9 months ago
HMI-Based Attack
upvoted 2 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: B
OT Threats _ Side- Channel Attacks Attackers perform a side-channel attack by monitoring its physical implementation to obtain critical information from a target system. Timing Analysis - Passwords are often transmitted through a serial channel. Attackers employ a loop strategy to recover these passwords. The timing-based attacks can be easily detected and blocked. (P.2728/2712)
upvoted 4 times
...
Daniel8660
1 year, 7 months ago
Selected Answer: B
OT Threats Side- Channel Attacks Attackers perform a side-channel attack by monitoring its physical implementation to obtain critical information from a target system. (1) Timing Analysis - Attackers monitor the amount of time the device is taking to finish one complete password authentication process to determine the number of correct characters. (P.2728)
upvoted 5 times
...
dinonino
1 year, 7 months ago
Answer is Side channel attack, it involves time and power.
upvoted 2 times
...
dinonino
1 year, 7 months ago
We are now on V12
upvoted 1 times
...
Rachael_
1 year, 7 months ago
Can anybody confirm if still valid as of 7th Sept?
upvoted 2 times
...
Blueteam
1 year, 7 months ago
Practice this questions and you will pass the exam. Pay close attention to discussions. Questions all valid.
upvoted 1 times
...
thmsilverknight
1 year, 8 months ago
Passed 119/125. These are all valid.
upvoted 4 times
...
MMtc
1 year, 9 months ago
Selected Answer: B
Side-Channel Attack, Timing analysis.
upvoted 1 times
...
_empty_
1 year, 10 months ago
Passed today with 119/125. Only 2 questions not from this question set, one is about KRACK attack, the other is about pass the hash. And I felt most of my questions are from question 300-400 in this set. Pls get familiar with this question set!!!
upvoted 3 times
...
cesarai
1 year, 11 months ago
Selected Answer: B
B site- channel attack pg 2712
upvoted 2 times
...
siskoch
2 years ago
i pass the exam today and questions are still valid. only one question about attack to find a password which corresponds to the hashes. in the proposed responses we have "Pass the ticket" and "Pass the hash". i dont remember the others. Good luck !
upvoted 1 times
...
[Removed]
2 years ago
Selected Answer: B
Its be B Correct read is A side channel attack (timing analysis)
upvoted 2 times
...
djaBSNYVXSHGX
2 years ago
Where are the other (residual) three questions ? :)
upvoted 1 times
...
[Removed]
2 years, 1 month ago
Selected Answer: B
There are two types of side-channel attacks, timing analysis & power analysis. In Timing analysis the attacker employs a loop strategy to recover passwords transmitted. Attackers check how much time the device is taking to finish one complete password authentication process, through which they can determine how many characters entered are correct.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...