Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 127 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 127
Topic #: 1
[All 312-50v12 Questions]

In an advanced persistent threat scenario, an adversary follows a detailed set of procedures in the cyber kill chain. During one such instance, the adversary has successfully gained access to a corporate network and now attempts to obfuscate malicious traffic within legitimate network traffic. Which of the following actions would most likely be part of the adversary's current procedures?

  • A. Employing data staging techniques to collect and aggregate sensitive data.
  • B. Initiating DNS tunneling to communicate with the command-and-control server.
  • C. Establishing a command-and-control server to communicate with compromised systems.
  • D. Conducting internal reconnaissance using PowerShell scripts.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
insaniunt
9 months, 2 weeks ago
Selected Answer: B
B. "Adversaries use DNS tunneling to obfuscate malicious traffic in the legitimate traffic carried by common protocols used in the network..." (Module 01 Page 26 from CEH v12 book)
upvoted 1 times
...
qwerty100
9 months, 3 weeks ago
Selected Answer: B
B) https://attack.mitre.org/techniques/T1071/004/
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...