Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 72 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 72
Topic #: 1
[All 312-50v12 Questions]

Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit.
What is the technique used by Jack to launch the fileless malware on the target systems?

  • A. In-memory exploits
  • B. Legitimate applications
  • C. Script-based injection
  • D. Phishing
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
insaniunt
11 months ago
Selected Answer: D
D. Phishing
upvoted 1 times
...
581777a
1 year, 3 months ago
Selected Answer: D
D. Phishing
upvoted 1 times
...
Vincent_Lu
1 year, 5 months ago
D. Phishing
upvoted 1 times
...
jeremy13
1 year, 6 months ago
Selected Answer: D
D. Phishing
upvoted 1 times
...
victorfs
1 year, 6 months ago
Selected Answer: D
The correcto option is D. Phising
upvoted 1 times
...
sausageman
1 year, 7 months ago
Selected Answer: D
My bad it's D phishing: Module 07 Page 727 "Attackers commonly use social engineering techniques such as phishing to spread fileless malware to the target systems. They send spam emails embedded with malicious links to the victim. When the victim clicks on the link, he/she will be directed to a fraudulent website that automatically loads Flash and triggers the exploit."
upvoted 2 times
...
sausageman
1 year, 7 months ago
Selected Answer: A
A. In-memory exploits Book v12 Module 07 Page 725
upvoted 1 times
sausageman
1 year, 7 months ago
My bad it's D phishing: Module 07 Page 727 "Attackers commonly use social engineering techniques such as phishing to spread fileless malware to the target systems. They send spam emails embedded with malicious links to the victim. When the victim clicks on the link, he/she will be directed to a fraudulent website that automatically loads Flash and triggers the exploit."
upvoted 3 times
...
...
eli117
1 year, 7 months ago
Selected Answer: D
D. Phishing Explanation: Jack used phishing to deliver the fileless malware to Incalsol's systems. Phishing is a social engineering attack where an attacker sends fraudulent emails, text messages, or instant messages that seem to be from a legitimate source to trick the victim into divulging sensitive information, clicking on a link, or downloading an attachment. In this case, Jack used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...