Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 10 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 10
Topic #: 1
[All 312-50v12 Questions]

You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email.
Which stage of the cyber kill chain are you at?

  • A. Reconnaissance
  • B. Weaponization
  • C. Command and control
  • D. Exploitation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
eli117
Highly Voted 1 year, 7 months ago
Selected Answer: B
B. Weaponization The cyber kill chain is a framework that describes the different stages of a cyber attack. The stages of the kill chain are as follows: Reconnaissance Weaponization Delivery Exploitation Installation Command and Control Actions on Objectives In this scenario, the penetration tester has already completed the first stage of reconnaissance by harvesting the employees' email addresses from public sources. They are now in the second stage of weaponization, where they are creating a client-side backdoor and attaching it to an email in order to deliver it to the employees. The next stages of the kill chain would be delivery, where the email is sent to the employees, followed by exploitation, installation, and command and control, where the attacker gains access to the target system and establishes a channel for ongoing communication.
upvoted 22 times
...
nickfun
Most Recent 1 month, 4 weeks ago
Selected Answer: B
B. Weaponization his stage involves the creation or acquisition of a malicious payload, like a client-side backdoor, and preparing it for delivery to the target. In this scenario, you are creating a client-side backdoor to send to the employees via email, which is the weaponization stage.
upvoted 3 times
...
kimsteve
1 month, 4 weeks ago
Selected Answer: B
Based on the vulnerabilities identified during analysis, the adversary selects or creates a tailored deliverable malicious payload (remote-access malware weapon) using an exploit and a backdoor to send it to the victim. An adversary may target specific network devices, operating systems, endpoint devices, or even individuals within the organization to carry out their attack.
upvoted 1 times
...
mashhood
10 months ago
B. Weaponization
upvoted 2 times
...
insaniunt
12 months ago
Selected Answer: B
B. Weaponization are ***creating*** a client-side backdoor to send it to the employees via email.
upvoted 2 times
...
rayy48
1 year ago
Weaponization as well
upvoted 1 times
...
hejono5538
1 year ago
Selected Answer: B
Weaponization
upvoted 1 times
...
killwitch
1 year, 1 month ago
Selected Answer: B
B: Weapanization Weird that even though this is most voted answer I see selected D...
upvoted 1 times
...
amy_trini
1 year, 1 month ago
B. Weaponization
upvoted 1 times
...
ZacharyDriver
1 year, 4 months ago
Selected Answer: B
B. Weaponization
upvoted 2 times
...
Rizwann
1 year, 4 months ago
Selected Answer: B
Weaponisation
upvoted 1 times
...
Vincent_Lu
1 year, 5 months ago
B. Weaponization
upvoted 2 times
...
teenwolf18
1 year, 6 months ago
Weaponization
upvoted 2 times
...
HeyacedoGomez
1 year, 7 months ago
Selected Answer: B
Weaponization
upvoted 3 times
...
bellabop
1 year, 7 months ago
Selected Answer: B
B. Weaponization
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...