Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 228 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 228
Topic #: 1
[All 312-50v12 Questions]

In a large organization, a network security analyst discovered a series of packet captures that seem unusual. The network operates on a switched Ethernet environment. The security team suspects that an attacker might be using a sniffer tool. Which technique could the attacker be using to successfully carry out this attack, considering the switched nature of the network?

  • A. The attacker might be compromising physical security to plug into the network directly.
  • B. The attacker might be implementing MAC flooding to overwhelm the switch's memory.
  • C. The attacker is probably using a Trojan horse with in-built sniffing capability.
  • D. The attacker might be using passive sniffing, as it provides significant stealth advantages.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
g_man_rap
6 months, 4 weeks ago
Option B, MAC flooding to overwhelm the switch's memory, is the most plausible technique that an attacker might use in a switched network environment to enable traffic sniffing broadly across the network. This method effectively makes the switch behave more like a hub, broadcasting traffic to all connected devices and thus enabling a sniffer to capture traffic not originally intended for the attacker’s connected device.
upvoted 1 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: B
I would've gone with C/D because it makes more sense, however we have more packages than usual and C would fail because in sniffing you don't generate pakcages...you just inspect them. D...well, we see activity generated so it cannot be
upvoted 1 times
...
mossj
8 months ago
Selected Answer: B
B: MAC flooding MAC flooding makes use of this limitation to bombard switches with fake MAC addresses until the switches can no longer keep up. Once this happens to a switch, it will enter fail-open mode, wherein it starts acting as a hub by broadcasting packets to all the ports on the switch.
upvoted 1 times
...
qtygbapjpesdayazko
8 months, 1 week ago
Selected Answer: B
The correct is B, MAC flooding, the keyword is "Which technique"
upvoted 1 times
...
calx5
9 months ago
Selected Answer: B
MAC flooding for switch environment.
upvoted 1 times
...
duke_of_kamulu
9 months ago
according to the CEHv12 pg 1214 we have pasive n active but been an attack we see more packets flooded so we eliminate the possibility of it been a trajon horse "passively monitoring" to actively sniffing sothe ANSWER becomes B
upvoted 2 times
...
insaniunt
9 months, 1 week ago
Selected Answer: B
I read once again the book: To summarize the types of sniffing: passive sniffing does not send any packets; it only monitors the packets sent by others. Active sniffing involves sending out multiple network probes to identify access points. The following is a list of different active sniffing techniques: ▪ MAC flooding - switch is vulnerable to active sniffing only. - Trojan horse is a passive sniffing methods Module 08 Page 1214
upvoted 4 times
...
athicalacker
9 months, 1 week ago
Selected Answer: B
The key here is unusual packet captures. MAC flooding involves sending a large number of spoofed MAC addresses to a switch, causing it to enter into a state where it forwards traffic to all ports, effectively turning it into a hub-like device. This could result in a flood of traffic that might be detected as unusual by network monitoring tools.
upvoted 3 times
qtygbapjpesdayazko
8 months, 2 weeks ago
This is the way
upvoted 1 times
...
...
przemyslaw1
9 months, 1 week ago
Selected Answer: B
B. The attacker might be implementing MAC flooding to overwhelm the switch's memory. MAC flooding force the switch into a less secure fail-open mode.
upvoted 2 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: C
Using a Trojan horse: Most Trojans have in-built sniffing capability. An attacker can install these on a victim’s machine to compromise it. After compromising the victim’s machine, the attacker can install a packet sniffer and perform sniffing. Most modern networks use switches instead of hubs. A switch eliminates the risk of passive sniffing. However, a switch is still vulnerable to active sniffing. Note: Passive sniffing provides significant stealth advantages over active sniffing - Module 08 Page 1214
upvoted 1 times
...
sogbe
9 months, 2 weeks ago
Selected Answer: C
Important thing to note here is that in the question they say you have "Discovered a series of packet captures which seem unusual" it's not saying that the Security staff have run those network captures but that they have found files of packet captures having been run by a presumably unknown party. I would think one of the only real ways that you are going to have packet capture files left on PC's on your network is if those PCs have had capturing software installed on them covertly by a Trojan virus and that software is now running scans from the infected PCs. Once you understand that the Security staff is finding network scanner files and is not the one doing the scanning, the Trojan horse answer is the only one which makes sense here.
upvoted 2 times
...
sogbe
9 months, 2 weeks ago
Important thing to note here is that in the question they say you have "Discovered a series of packet captures which seem unusual" it's not saying that the Security staff have run those network captures but that they have found files of packet captures having been run by a presumably unknown party. I would think one of the only real ways that you are going to have packet capture files left on PC's on your network is if those PCs have had capturing software installed on them covertly by a Trojan virus and that software is now running scans from the infected PCs. Once you understand that the Security staff is finding network scanner files and is not the one doing the scanning, the Trojan horse answer is the only one which makes sense here.
upvoted 1 times
...
rorahir
9 months, 2 weeks ago
Ethical hacking specialists could you please check if this approach is correct"
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...