exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 180 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 180
Topic #: 1
[All 312-50v13 Questions]

During a reconnaissance mission, an ethical hacker uses Maltego, a popular footprinting tool, to collect information about a target organization. The information includes the target's Internet infrastructure details (domains, DNS names, Netblocks, IP address information). The hacker decides to use social engineering techniques to gain further information. Which of the following would be the least likely method of social engineering to yield beneficial information based on the data collected?

  • A. Dumpster diving in the target company's trash bins for valuable printouts
  • B. Impersonating an ISP technical support agent to trick the target into providing further network details
  • C. Shoulder surfing to observe sensitive credentials input on the target’s computers
  • D. Eavesdropping on internal corporate conversations to understand key topics
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
NikoTomas
3 weeks, 6 days ago
Selected Answer: C
Choosing C) because with information gathered till now (domains, DNS names, Netblocks, IP address information) the next logical step would be utilizing the and/or extending the gathered information, which is described in these 3 options: --> A) search for new information in trash – extend information base --> B) impersonate an ISP technician – extend information base about networks, domains, etc... --> D) use gathered knowledge about networks and evesdrop there... (maybe you don’t have physical access but there can be WiFi signal...) C) lefts – shoulder surfing is LEAST likely method of social engineering to yield information based on the data collected.
upvoted 1 times
...
Gibsomd
1 month ago
Selected Answer: C
The ethical hacker has collected infrastructure-related data (e.g., IP addresses, DNS details, domains, Netblocks) and now intends to use social engineering to extract more information. The most effective social engineering techniques in this case would involve leveraging the collected data to impersonate a trusted entity or extract information from employees.
upvoted 2 times
NikoTomas
3 weeks, 6 days ago
Read question properly: "would be the LEAST likely method of social engineering to yield beneficial information "
upvoted 1 times
...
...
Dogeo
2 months ago
Selected Answer: D
Eavesdropping on corporate conversations may provide general business intelligence but is unlikely to reveal specific technical details like network configurations, IP ranges, or login credentials that would be useful for hacking.
upvoted 2 times
...
MHafizC
3 months ago
Selected Answer: C
You have to be inside the company and especially close to the target to do shoulder surfing. The answer is C.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago