Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 69 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 69
Topic #: 1
[All 312-50v12 Questions]

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection.
Identify the behavior of the adversary in the above scenario.

  • A. Unspecified proxy activities
  • B. Use of command-line interface
  • C. Data staging
  • D. Use of DNS tunneling
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jeremy13
Highly Voted 1 year, 7 months ago
Selected Answer: A
A. Unspecified proxy activities CEH book V12 Module 1 P26 Unspecified Proxy Activities : An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection. Security professionals can find unspecified domains by checking the data feeds that are generated by those domains. Using this data feed, the security professionals can also find any malicious files downloaded and the unsolicited communication with the outside network based on the domains.
upvoted 17 times
...
sunce12
Most Recent 5 months ago
A. Unspecified proxy activities
upvoted 1 times
...
LordXander
8 months ago
Selected Answer: B
So...it's B, 90% sure because there's a very similar question for the CTIA certification and it specifies that for Fast-Flux DNS the way you identifty it is by making use of command-line interface. Very well structured question, but now I can see that there's a lot of domain-crossing between certifications.
upvoted 1 times
LordXander
7 months, 2 weeks ago
So...I misunderstood the question; the way you identify it is indeed Use of CLI. However, if we have to mention what the attacker is doing, then it would be A
upvoted 2 times
...
...
D15
10 months, 3 weeks ago
Selected Answer: A
A. Unspecified proxy activities
upvoted 1 times
...
insaniunt
10 months, 4 weeks ago
Selected Answer: A
A. Unspecified proxy activities
upvoted 1 times
...
insaniunt
11 months, 1 week ago
Selected Answer: A
A. Unspecified proxy activities
upvoted 1 times
...
VidiMidi
1 year ago
Unspecified proxy activities !
upvoted 1 times
...
IPconfig
1 year ago
Selected Answer: A
Unspecified Proxy Activities An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection. Security professionals can find unspecified domains by checking the data feeds that are generated by those domains. Using this data feed, the security professionals can also find any malicious files downloaded and the unsolicited communication with the outside network based on the domains. CEH V12 pg 26
upvoted 2 times
...
naija4life
1 year, 4 months ago
Selected Answer: D
D. Use of DNS tunneling
upvoted 3 times
...
victorfs
1 year, 6 months ago
Selected Answer: A
The correct option is A. . Unspecified proxy activities
upvoted 3 times
...
sTaTiK
1 year, 6 months ago
Selected Answer: A
The Anser is A, you can check ansers on V11.
upvoted 3 times
...
sausageman
1 year, 7 months ago
Selected Answer: A
A. Unspecified proxy activities In my book is module 1 page 18
upvoted 2 times
...
eli117
1 year, 7 months ago
Selected Answer: D
D. Use of DNS tunneling Explanation: DNS tunneling is a technique used by adversaries to bypass security controls and exfiltrate data from a compromised network. It involves creating DNS queries and responses that encapsulate other types of traffic, such as command and control communications or stolen data.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...