Free 312-50v13 Exam Braindumps (page: 19)

Page 18 of 79

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection.

Identify the behavior of the adversary in the above scenario.

  1. Unspecified proxy activities
  2. Use of command-line interface
  3. Data staging
  4. Use of DNS tunneling

Answer(s): B



What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

  1. Packet fragmentation scanning
  2. Spoof source address scanning
  3. Decoy scanning
  4. Idle scanning

Answer(s): D



By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext.

Which file do you have to clean to clear the password?

  1. .xsession-log
  2. .profile
  3. .bashrc
  4. .bash_history

Answer(s): D



Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit.

What is the technique used by Jack to launch the fileless malware on the target systems?

  1. In-memory exploits
  2. Legitimate applications
  3. Script-based injection
  4. Phishing

Answer(s): D






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts