exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 191 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 191
Topic #: 1
[All 312-50v12 Questions]

Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She discovered a malicious program spread through the instant messenger application used by her team. The attacker had obtained access to one of her teammate's messenger accounts and started sending files across the contact list. Which best describes the attack scenario and what measure could have prevented it?

  • A. Insecure Patch Management; updating application software regularly
  • B. Instant Messenger Applications; verifying the sender's identity before opening any files
  • C. Rogue/Decoy Applications; ensuring software is labeled as TRUSTED
  • D. Portable Hardware Media/Removable Devices; disabling Autorun functionality
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
r3vrnd
4 months, 3 weeks ago
B is the correct answer. This Question is 2 questions... What is this attack an example of, and how to mitigate. it is an instant messaging application attack is the only answer provided that fits from question, even if answer A would fix the initial entry, this isnt what the question wants
upvoted 1 times
...
Thranduil1789
5 months, 1 week ago
Selected Answer: A
The scenario involves an attacker gaining unauthorized access to a teammate’s account and using it to distribute malicious files to the contact list.t. Verifying the identity may not help if the sender is indeed a trusted teammate.
upvoted 1 times
...
GK2205
8 months, 2 weeks ago
Selected Answer: B
Seems like a trick question given the sender was technically already a "Trusted" third party to the contacts on the other teammates list. However, if you read the answers closely, the only contextual reference to instant messenger is B. The trick in the question is in the section after "Instant Messenger applications" referring to Validation, I think they do this to deliberately throw you off.
upvoted 1 times
...
LoveBug4
9 months, 1 week ago
Selected Answer: B
Module 7, page 948
upvoted 1 times
...
Bas375
11 months, 3 weeks ago
B - Opening files from unknown source should be verified e.g. the attacker that compromise the account if that make sense
upvoted 1 times
...
LordXander
1 year ago
Selected Answer: B
Okay, I will be the one saying C..I know...it might be stupid/wrong but hear me out. So, after some discussions with a few cyber experts, we agreed that both B and C could be the correct options, it really depends on your angle. For option B, the arguments is that the verification could be something set, server side, such as a 2FA(you send a file, you must auth with 2FA) -> valid idea, a bit uncommon, but valid For option C - the idea of having files scanned before being sent by different solutions and then marked as TRUSTED is another way of approaching this since 2FA can be bypassed (looking at MS). So after even more deliberations, if I had this question, I would go with option B as it covers more ground (software fails, but an email protection service fails more often than 2FA)
upvoted 1 times
...
DruSuperman
1 year ago
Selected Answer: B
B is the only one that makes sense.
upvoted 1 times
duke_of_kamulu
1 year ago
from 126 upward is it the real exam
upvoted 1 times
...
B is the only one that makes sense. This is the way
upvoted 1 times
...
...
anarchyeagle
1 year, 1 month ago
Chat GPT: Verifying the sender's identity before opening any files is a crucial preventive measure in this context. This can involve double-checking with the sender through a different communication channel before opening unexpected files or links, even if they appear to come from someone you know. This measure helps to mitigate the risk of similar attacks by ensuring that the files or links are genuinely intended and safe to open.
upvoted 2 times
...
calx5
1 year, 1 month ago
Selected Answer: A
Question mentioned that account was compromised
upvoted 1 times
Lalo
1 year ago
Answer BBBBBBBB option B is correct because it focuses on a direct and relevant preventive measure for the given scenario, while option A does not address the specific problem presented in the attack scenario.
upvoted 1 times
...
...
przemyslaw1
1 year, 1 month ago
Selected Answer: B
B. Instant Messenger Applications; verifying the sender's identity before opening any files CEH book, Module 7 - Different Ways for Malware to Enter a System.
upvoted 2 times
...
ryotan
1 year, 1 month ago
Selected Answer: A
It should not be B, as the attacker obtained access to one of the teammate's messenger accounts, so even if you verify the sender's identity, it is not a fake account, it does not help. A is the option for me.
upvoted 4 times
Lalo
1 year ago
Answer BBBBBBBB option B is correct because it focuses on a direct and relevant preventive measure for the given scenario, while option A does not address the specific problem presented in the attack scenario.
upvoted 1 times
...
athicalacker
1 year, 1 month ago
How can regular software update prevent an attack that exploits user trust?? The answer can't be Option A.
upvoted 3 times
Mabrow
1 year, 1 month ago
how about C?, any program send with messenger must be trusted
upvoted 1 times
...
...
...
insaniunt
1 year, 1 month ago
Selected Answer: B
B. Instant Messenger Applications; verifying the sender's identity before opening any files
upvoted 1 times
...
pechuga
1 year, 1 month ago
A option for me
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago