exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 69 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 69
Topic #: 1
[All 312-50v13 Questions]

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. Identify the behavior of the adversary in the above scenario.

  • A. Unspecified proxy activities
  • B. Use of command-line interface
  • C. Data staging
  • D. Use of DNS tunneling
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
HazalAlenazi
1 month, 3 weeks ago
Selected Answer: A
A. Unspecified proxy activities Explanation: In the scenario, Clark is using multiple domains pointing to the same host, likely for the purpose of switching between domains quickly to avoid detection. This behavior aligns with unspecified proxy activities, where the attacker uses various methods to mask their true actions or obfuscate their presence on a network. By using multiple domains pointing to the same host, Clark is trying to avoid detection by security measures that might track a single domain or IP address.
upvoted 2 times
...
pindinga1
2 months ago
Selected Answer: D
DNS tunneling is the correct.
upvoted 1 times
...
Stephanie0208
2 months, 2 weeks ago
Selected Answer: A
Unspecified Proxy Activities An adversary can create and configure multiple domains pointing to the same host, thus, allowing an adversary to switch quickly between the domains to avoid detection. Security professionals can find unspecified domains by checking the data feeds that are generated by those domains. Using this data feed, the security professionals can also find any malicious files downloaded and the unsolicited communication with the outside network based on the domains. ▪ Use of Command-Line Interface On gaining access to the target system, an adversary can make use of the command-line interface to interact with the target system, browse the files, read file content, modify file content, create new accounts, connect to the remote system, and download and install malicious code. Security professionals can identify this behavior of an adversary by checking the logs for process ID, processes having arbitrary letters and numbers, and malicious files downloaded from the Internet.
upvoted 2 times
...
MHafizC
2 months, 2 weeks ago
Selected Answer: A
A. This is an unspecified proxy activities.
upvoted 1 times
...
tong0819
2 months, 3 weeks ago
Selected Answer: A
Answer is A.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago