exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 17 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 17
Topic #: 1
[All 312-50v12 Questions]

Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection.
What is the APT lifecycle phase that Harry is currently executing?

  • A. Initial intrusion
  • B. Persistence
  • C. Cleanup
  • D. Preparation
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Vincent_Lu
Highly Voted 1 year, 9 months ago
Selected Answer: A
Preparation Initial Intrusion Expansion Persistence Search and Exfiltration Clean up
upvoted 7 times
...
Mann098
Most Recent 3 months, 3 weeks ago
Selected Answer: A
Initial Intrusion
upvoted 1 times
...
eli117
6 months, 4 weeks ago
Selected Answer: A
A. Initial intrusion In this scenario, Harry, a professional hacker, is targeting the IT infrastructure of an organization. He is using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers to gain initial access to the target network. By successfully deploying malware on the target system, he establishes an outbound connection, allowing him to maintain access to the network. The APT lifecycle consists of several phases, including initial intrusion, persistence, command and control, lateral movement, and data exfiltration. In the initial intrusion phase, the attacker gains access to the target network using various techniques, such as exploiting vulnerabilities or social engineering. Therefore, the correct answer is A. Initial intrusion.
upvoted 3 times
...
sunce12
10 months ago
Option A initial Instrusion
upvoted 1 times
...
Nicknp
11 months, 2 weeks ago
Selected Answer: A
Option A initial Instrusion
upvoted 1 times
...
insaniunt
1 year, 4 months ago
Selected Answer: A
Initial Intrusion
upvoted 1 times
...
YonGCybeR
1 year, 5 months ago
Refer to CEH v12 Module 7 Malware threats - APT Concepts page 649 Initial Intrusion The next phase involves attempting to enter the target network. Common techniques used for an initial intrusion are sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Spear-phishing emails usually appear legitimate but they contain malicious links or attachments containing executable malware. These malicious links can redirect the target to the website where the target’s web browser and software are compromised by the attacker using various exploit techniques. Sometimes, an attacker may also use social engineering techniques to gather information from the target. After obtaining information from the target, attackers use such information to launch further attacks on the target network. In this phase, malicious code or malware is deployed into the target system to initiate an outbound connection.
upvoted 3 times
...
IPconfig
1 year, 6 months ago
Initial Intrusion Deployment of malware Establishment of outbound connection
upvoted 1 times
...
pawnpusher
1 year, 7 months ago
Selected Answer: B
Are yall actually reading the question? Answer is B This is the key part -- "By successfully deploying malware on the target system, he establishes an outbound connection, allowing him to maintain access to the network." This is AFTER the initial intrusion he creates a persistent OUTBOUND connection.
upvoted 4 times
I_Know_Everything_KY
1 year, 2 months ago
You're making up your own words there, and got the answer wrong as a result. Nowhere was "maintain access" used in the question, and your own inference of "persistent" is also wrong. Take your own advise: read the question!
upvoted 3 times
...
sringan
1 year, 6 months ago
Wrong. Please check CEH v12 official book Module 7 Malware Threats page no: 966.
upvoted 5 times
...
...
jeremy13
2 years ago
Selected Answer: A
A. Initial intrusion
upvoted 3 times
jeremy13
1 year, 11 months ago
CEH Book V12 Module 07 Page 966 from book : " 2. Initial Intrusion Common techniques used for an initial intrusion are sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. "
upvoted 4 times
qtygbapjpesdayazko
1 year, 1 month ago
This is the way
upvoted 2 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago