exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 309 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 309
Topic #: 1
[All 312-50v12 Questions]

Which of the following tactics uses malicious code to redirect users’ web traffic?

  • A. Spear-phishing
  • B. Phishing
  • C. Spimming
  • D. Pharming
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jeejy
Highly Voted 3 months, 3 weeks ago
Selected Answer: D
Today, I had an exam, and I can confidently say that every question on the exam was covered here. I passed.
upvoted 5 times
e541084
1 month, 3 weeks ago
im so happy to hear that and happy for you
upvoted 1 times
...
...
kenjeshry
Most Recent 1 month ago
Selected Answer: D
CEHv12 p1353
upvoted 1 times
...
prasoonmk
8 months, 3 weeks ago
Selected Answer: D
Pharming is a type of social engineering cyberattack in which criminals redirect internet users trying to reach a specific website to a different, fake site. These “spoofed” sites aim to capture a victim’s personally identifiable information (PII) and log-in credentials, such as passwords, social security numbers, account numbers, and so on, or else they attempt to install pharming malware on their computer. Pharmers often target websites in the financial sector, including banks, online payment platforms, or e-commerce sites, usually with identity theft as their ultimate objective. Pharming exploits the foundation of how internet browsing works — namely, that the sequence of letters that form an internet address, such as www.google.com, have to be converted into an IP address by a DNS server for the connection to proceed.
upvoted 2 times
...
ahmedalkibsy
1 year, 1 month ago
D. Pharming is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software
upvoted 1 times
...
insaniunt
1 year, 1 month ago
Selected Answer: D
D. Pharming
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago