Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 180 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 180
Topic #: 1
[All 312-50v12 Questions]

During a reconnaissance mission, an ethical hacker uses Maltego, a popular footprinting tool, to collect information about a target organization. The information includes the target's Internet infrastructure details (domains, DNS names, Netblocks, IP address information). The hacker decides to use social engineering techniques to gain further information. Which of the following would be the least likely method of social engineering to yield beneficial information based on the data collected?

  • A. Dumpster diving in the target company's trash bins for valuable printouts
  • B. Impersonating an ISP technical support agent to trick the target into providing further network details
  • C. Shoulder surfing to observe sensitive credentials input on the target’s computers
  • D. Eavesdropping on internal corporate conversations to understand key topics
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
94578de
5 months ago
Selected Answer: C
The correct answer is C because to perform shoulder surfing you have to be in the facility and stay behind an employee's shoulder
upvoted 2 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: A
Well, B is definitely not correct for one single reason: you already have the IP, so you know who the ISP is and you could definitely get come info. C&D are more efetive when you already have some information mapped...however quite questionable when you only have some IPs. A...for A you don't need any prerequisites hence it makes a lot of sense to be A.
upvoted 1 times
...
qwerty100
8 months, 4 weeks ago
Selected Answer: C
C. Shoulder surfing to observe sensitive credentials input on the target’s computers
upvoted 1 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: B
B. Impersonating an ISP technical support agent to trick the target into providing further network details
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...