Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 32 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 32
Topic #: 1
[All 312-50v12 Questions]

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine.
Which of the following techniques is used by Joel in the above scenario?

  • A. Watering hole attack
  • B. DNS rebinding attack
  • C. MarioNet attack
  • D. Clickjacking attack
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jeremy13
Highly Voted 1 year, 7 months ago
Selected Answer: A
A. Watering hole attack P1952 / Module 14 CEH book V12 +Watering Hole Attack It is a type of unvalidated redirect attack whereby the attacker first identifies the most visited website of the target, determines the vulnerabilities in the website, injects malicious code into the vulnerable web application, and then waits for the victim to browse the website. Once the victim tries to access the website, the malicious code executes, infecting the victim.
upvoted 6 times
...
Nicknp
Most Recent 6 months, 2 weeks ago
Selected Answer: D
Clickjacking
upvoted 1 times
...
AA_Ron
1 year ago
Selected Answer: A
Watering hole attack. You can lead a horse but you can’t make him drink
upvoted 3 times
...
eli117
1 year, 7 months ago
Selected Answer: A
A. Watering hole attack Explanation: In the given scenario, Joel is using a technique called the watering hole attack. This technique involves the attacker targeting a specific group of individuals or organization by infecting a website that the targeted group regularly visits, also known as the "watering hole". The attacker then injects a malicious code into the website, which can be used to download malware onto the victim's machine. When the victim visits the infected website, the malware is automatically downloaded onto their system. This attack is often used when traditional phishing techniques fail to work or are too risky to execute.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...