Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 191 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 191
Topic #: 1
[All 312-50v12 Questions]

Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She discovered a malicious program spread through the instant messenger application used by her team. The attacker had obtained access to one of her teammate's messenger accounts and started sending files across the contact list. Which best describes the attack scenario and what measure could have prevented it?

  • A. Insecure Patch Management; updating application software regularly
  • B. Instant Messenger Applications; verifying the sender's identity before opening any files
  • C. Rogue/Decoy Applications; ensuring software is labeled as TRUSTED
  • D. Portable Hardware Media/Removable Devices; disabling Autorun functionality
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
r3vrnd
2 weeks ago
B is the correct answer. This Question is 2 questions... What is this attack an example of, and how to mitigate. it is an instant messaging application attack is the only answer provided that fits from question, even if answer A would fix the initial entry, this isnt what the question wants
upvoted 1 times
...
Thranduil1789
3 weeks, 4 days ago
Selected Answer: A
The scenario involves an attacker gaining unauthorized access to a teammate’s account and using it to distribute malicious files to the contact list.t. Verifying the identity may not help if the sender is indeed a trusted teammate.
upvoted 1 times
...
GK2205
4 months ago
Selected Answer: B
Seems like a trick question given the sender was technically already a "Trusted" third party to the contacts on the other teammates list. However, if you read the answers closely, the only contextual reference to instant messenger is B. The trick in the question is in the section after "Instant Messenger applications" referring to Validation, I think they do this to deliberately throw you off.
upvoted 1 times
...
LoveBug4
4 months, 4 weeks ago
Selected Answer: B
Module 7, page 948
upvoted 1 times
...
Bas375
7 months, 1 week ago
B - Opening files from unknown source should be verified e.g. the attacker that compromise the account if that make sense
upvoted 1 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: B
Okay, I will be the one saying C..I know...it might be stupid/wrong but hear me out. So, after some discussions with a few cyber experts, we agreed that both B and C could be the correct options, it really depends on your angle. For option B, the arguments is that the verification could be something set, server side, such as a 2FA(you send a file, you must auth with 2FA) -> valid idea, a bit uncommon, but valid For option C - the idea of having files scanned before being sent by different solutions and then marked as TRUSTED is another way of approaching this since 2FA can be bypassed (looking at MS). So after even more deliberations, if I had this question, I would go with option B as it covers more ground (software fails, but an email protection service fails more often than 2FA)
upvoted 1 times
...
DruSuperman
8 months, 3 weeks ago
Selected Answer: B
B is the only one that makes sense.
upvoted 1 times
duke_of_kamulu
8 months, 1 week ago
from 126 upward is it the real exam
upvoted 1 times
...
qtygbapjpesdayazko
8 months, 1 week ago
B is the only one that makes sense. This is the way
upvoted 1 times
...
...
anarchyeagle
8 months, 3 weeks ago
Chat GPT: Verifying the sender's identity before opening any files is a crucial preventive measure in this context. This can involve double-checking with the sender through a different communication channel before opening unexpected files or links, even if they appear to come from someone you know. This measure helps to mitigate the risk of similar attacks by ensuring that the files or links are genuinely intended and safe to open.
upvoted 2 times
...
calx5
9 months ago
Selected Answer: A
Question mentioned that account was compromised
upvoted 1 times
Lalo
8 months ago
Answer BBBBBBBB option B is correct because it focuses on a direct and relevant preventive measure for the given scenario, while option A does not address the specific problem presented in the attack scenario.
upvoted 1 times
...
...
przemyslaw1
9 months ago
Selected Answer: B
B. Instant Messenger Applications; verifying the sender's identity before opening any files CEH book, Module 7 - Different Ways for Malware to Enter a System.
upvoted 2 times
...
ryotan
9 months, 1 week ago
Selected Answer: A
It should not be B, as the attacker obtained access to one of the teammate's messenger accounts, so even if you verify the sender's identity, it is not a fake account, it does not help. A is the option for me.
upvoted 4 times
Lalo
8 months ago
Answer BBBBBBBB option B is correct because it focuses on a direct and relevant preventive measure for the given scenario, while option A does not address the specific problem presented in the attack scenario.
upvoted 1 times
...
athicalacker
9 months ago
How can regular software update prevent an attack that exploits user trust?? The answer can't be Option A.
upvoted 3 times
Mabrow
9 months ago
how about C?, any program send with messenger must be trusted
upvoted 1 times
...
...
...
insaniunt
9 months, 2 weeks ago
Selected Answer: B
B. Instant Messenger Applications; verifying the sender's identity before opening any files
upvoted 1 times
...
pechuga
9 months, 2 weeks ago
A option for me
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...