Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 128 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 128
Topic #: 1
[All 312-50v12 Questions]

As a part of an ethical hacking exercise, an attacker is probing a target network that is suspected to employ various honeypot systems for security. The attacker needs to detect and bypass these honeypots without alerting the target. The attacker decides to utilize a suite of techniques. Which of the following techniques would NOT assist in detecting a honeypot?

  • A. Implementing a brute force attack to verify system vulnerability
  • B. Probing system services and observing the three-way handshake
  • C. Using honeypot detection tools like Send-Safe Honeypot Hunter
  • D. Analyzing the MAC address to detect instances running on VMware
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
a307962
4 months, 2 weeks ago
Selected Answer: A
A. Implementing a brute force attack
upvoted 1 times
...
calx5
9 months ago
Selected Answer: A
A, Thanks for reminder.
upvoted 1 times
...
ryotan
9 months, 1 week ago
Selected Answer: A
brute force attack may be detected by honey pots, so A is the answer.
upvoted 1 times
...
calx5
9 months, 1 week ago
Selected Answer: C
C Tools to detect honeypots include Send-safe Honeypot Hunter (http://www.send-safe.com) and kippo_detect (https://github.com).
upvoted 1 times
ryotan
9 months, 1 week ago
The question is Which of the following techniques would {NOT} assist in detecting a honeypot”, as the tool helps, hence, it is "NOT" correct.
upvoted 4 times
...
...
[Removed]
9 months, 2 weeks ago
Could someone help me confirm the accuracy of this data
upvoted 1 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: A
A. Implementing a brute force attack to verify system vulnerability (reference: Module 12 Page 1757 from CEH v12 book)
upvoted 1 times
...
qwerty100
9 months, 3 weeks ago
Selected Answer: A
A. Implementing a brute force attack to verify system vulnerability
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...