exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 154 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 154
Topic #: 1
[All 312-50v11 Questions]

Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

  • A. Scanning
  • B. Gaining access
  • C. Maintaining access
  • D. Reconnaissance
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ripple
Highly Voted 1 year, 10 months ago
B: Gaining Access It's specifically discussing methods of gaining the initial access and NOT maintaining access or ensuring persistence after the fact. Using malware to obtain credentials or phishing staff members for credentials are very, very clearly Gaining Access.
upvoted 10 times
...
beowolf
Highly Voted 1 year, 10 months ago
Answer is correct. if it's maintenance phase attacker has successfully compromised the system so why would the attacker use phishing again?
upvoted 7 times
...
Daniel8660
Most Recent 6 months, 1 week ago
Selected Answer: B
Hacking Phase: Gaining Access Gaining access refers to the point where the attacker obtains access to the operating system or applications on the target computer or network. (P.51/35)
upvoted 2 times
...
Genesis777
6 months, 2 weeks ago
CEHv11 pg 51 - Attackers gain access to the target system locally (offline), over a LAN, or on the Internet. Examples include password cracking, stack-based buffer overflows, denial of service, and session hijacking. Using a technique called spoofing to exploit the system by pretending to be a legitimate user or a different system, attackers can send a data packet containing a bug to the target system in order to exploit a vulnerability.
upvoted 2 times
...
uday1985
7 months, 1 week ago
Magic word is "phishing to gain credentials"! it means that credentials are not obtained yet, and they still need to be stolen to maintain access!
upvoted 1 times
...
RottenCow21
11 months, 3 weeks ago
Selected Answer: B
B: Gaining Access is correct
upvoted 1 times
...
[Removed]
1 year, 5 months ago
Selected Answer: B
B: Gaining Access
upvoted 4 times
...
ANDRESCB1988
1 year, 9 months ago
correct
upvoted 3 times
...
JArafat
1 year, 11 months ago
Answer: Maintaining Access 3. Gaining Access: This phase is where an attacker breaks into the system/network using various tools or methods. After entering into a system, he has to increase his privilege to administrator level so he can install an application he needs or modify data or hide data. 4. Maintaining Access: Hacker may just hack the system to show it was vulnerable or he can be so mischievous that he wants to maintain or persist the connection in the background without the knowledge of the user. This can be done using Trojans, Rootkits or other malicious files. The aim is to maintain the access to the target until he finishes the tasks he planned to accomplish in that target.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago