Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 17 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 17
Topic #: 1
[All 312-50v12 Questions]

Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection.
What is the APT lifecycle phase that Harry is currently executing?

  • A. Initial intrusion
  • B. Persistence
  • C. Cleanup
  • D. Preparation
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Vincent_Lu
Highly Voted 1 year, 4 months ago
Selected Answer: A
Preparation Initial Intrusion Expansion Persistence Search and Exfiltration Clean up
upvoted 7 times
...
eli117
Most Recent 1 month, 4 weeks ago
Selected Answer: A
A. Initial intrusion In this scenario, Harry, a professional hacker, is targeting the IT infrastructure of an organization. He is using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers to gain initial access to the target network. By successfully deploying malware on the target system, he establishes an outbound connection, allowing him to maintain access to the network. The APT lifecycle consists of several phases, including initial intrusion, persistence, command and control, lateral movement, and data exfiltration. In the initial intrusion phase, the attacker gains access to the target network using various techniques, such as exploiting vulnerabilities or social engineering. Therefore, the correct answer is A. Initial intrusion.
upvoted 2 times
...
sunce12
5 months ago
Option A initial Instrusion
upvoted 1 times
...
Nicknp
6 months, 2 weeks ago
Selected Answer: A
Option A initial Instrusion
upvoted 1 times
...
insaniunt
12 months ago
Selected Answer: A
Initial Intrusion
upvoted 1 times
...
YonGCybeR
1 year ago
Refer to CEH v12 Module 7 Malware threats - APT Concepts page 649 Initial Intrusion The next phase involves attempting to enter the target network. Common techniques used for an initial intrusion are sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Spear-phishing emails usually appear legitimate but they contain malicious links or attachments containing executable malware. These malicious links can redirect the target to the website where the target’s web browser and software are compromised by the attacker using various exploit techniques. Sometimes, an attacker may also use social engineering techniques to gather information from the target. After obtaining information from the target, attackers use such information to launch further attacks on the target network. In this phase, malicious code or malware is deployed into the target system to initiate an outbound connection.
upvoted 3 times
...
IPconfig
1 year, 1 month ago
Initial Intrusion Deployment of malware Establishment of outbound connection
upvoted 1 times
...
pawnpusher
1 year, 2 months ago
Selected Answer: B
Are yall actually reading the question? Answer is B This is the key part -- "By successfully deploying malware on the target system, he establishes an outbound connection, allowing him to maintain access to the network." This is AFTER the initial intrusion he creates a persistent OUTBOUND connection.
upvoted 4 times
I_Know_Everything_KY
9 months, 2 weeks ago
You're making up your own words there, and got the answer wrong as a result. Nowhere was "maintain access" used in the question, and your own inference of "persistent" is also wrong. Take your own advise: read the question!
upvoted 3 times
...
sringan
1 year, 1 month ago
Wrong. Please check CEH v12 official book Module 7 Malware Threats page no: 966.
upvoted 3 times
...
...
jeremy13
1 year, 7 months ago
Selected Answer: A
A. Initial intrusion
upvoted 3 times
jeremy13
1 year, 6 months ago
CEH Book V12 Module 07 Page 966 from book : " 2. Initial Intrusion Common techniques used for an initial intrusion are sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. "
upvoted 4 times
qtygbapjpesdayazko
8 months, 2 weeks ago
This is the way
upvoted 2 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...