Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 289 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 289
Topic #: 1
[All 312-50v12 Questions]

Stephen, an attacker, targeted the industrial control systems of an organization. He generated a fraudulent email with a malicious attachment and sent it to employees of the target organization. An employee who manages the sales software of the operational plant opened the fraudulent email and clicked on the malicious attachment. This resulted in the malicious attachment being downloaded and malware being injected into the sales software maintained in the victim's system. Further, the malware propagated itself to other networked systems, finally damaging the industrial automation components.

What is the attack technique used by Stephen to damage the industrial systems?

  • A. HMI-based attack
  • B. SMishing attack
  • C. Reconnaissance attack
  • D. Spear-phishing attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
shaody
3 months ago
Selected Answer: D
D is correct.
upvoted 1 times
...
GK2205
4 months ago
Selected Answer: D
Definitely D: They technique is social engineering to inject malware that propagated. Nowhere in the description is a Human-Machine-interface (HMI) discussed
upvoted 1 times
...
g_man_rap
6 months, 4 weeks ago
D. Spear-phishing attack Description: Spear-phishing is a more targeted form of phishing where the attacker sends crafted emails to specific individuals or organizations. These emails often contain malware or links to malicious websites and are designed to appear legitimate to trick the recipient into performing actions that trigger malware installation or reveal confidential information. This matches Stephen's actions as described, where he sends a fraudulent email with a malicious attachment, directly targeting employees likely to have access to critical systems.
upvoted 1 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: D
The only attack that does damage to a ICS system, is HMI-based attack
upvoted 1 times
LordXander
7 months, 3 weeks ago
I meant to click on A
upvoted 1 times
...
...
anarchyeagle
8 months, 1 week ago
Selected Answer: D
ChatGPT: The attack technique used by Stephen to damage the industrial systems is described as a D. Spear-phishing attack. Here's why: Spear-phishing attack: This is a targeted attack where the attacker sends fraudulent emails to specific individuals or organizations to deceive them into clicking on malicious links or attachments. The goal is to gain unauthorized access to systems or to inject malware, as seen in the scenario described. The fact that Stephen generated a fraudulent email with a malicious attachment and targeted employees of the organization, leading to the compromise of their systems, fits the definition of a spear-phishing attack. HMI-based attack: This involves targeting the Human-Machine Interface (HMI) systems that are used to monitor and control industrial processes. While the malware did affect industrial automation components, the initial attack vector was through a phishing email, not a direct attack on HMI systems.
upvoted 1 times
...
duke_of_kamulu
8 months, 1 week ago
spear-pishing attack D Spear Phishing Attackers send fake emails containing malicious links or attachments, seemingly originated from legitimate or well-known sources, to the victim. When the victim clicks on the link or downloads the attachment, it injects malware, starts damaging the resources, and spreads itself to other systems. For example, an attacker sends a fraudulent email with a malicious attachment to a victim system that maintains the sales software of the operational plant. When the victim downloads the attachment, the malware is injected into the sales software, propagates itself to other networked systems, and finally damages industrial automation components.
upvoted 1 times
...
fridayfred3p
8 months, 3 weeks ago
Selected Answer: A
HMI-based attack. It asks what Stephen used to damage the industrial systems.
upvoted 1 times
...
500eb22
9 months ago
Selected Answer: D
HMI-based attack. It asks what Stephen used to damage the industrial systems.
upvoted 1 times
...
insaniunt
9 months ago
Selected Answer: D
D. Spear-phishing attack
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...