Free 312-85 Exam Braindumps (page: 1)

Page 1 of 13

Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.
Daniel comes under which of the following types of threat actor.

  1. Industrial spies
  2. State-sponsored hackers
  3. Insider threat
  4. Organized hackers

Answer(s): D



An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?

  1. DNS zone transfer
  2. Dynamic DNS
  3. DNS interrogation
  4. Fast-Flux DNS

Answer(s): D



Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).

Which TLP color would you signify that information should be shared only within a particular community?

  1. Red
  2. White
  3. Green
  4. Amber

Answer(s): D



Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.
Which of the following Google search queries should Moses use?

  1. relatewww.infothech.org
  2. info: www.infothech.org
  3. link: www.infothech.org
  4. cache: www.infothech.org

Answer(s): A



Page 1 of 13



Post your Comments and Discuss EC-Council 312-85 exam with other Community members:

Kamekar commented on May 25, 2024
Passed this exam on May 19. This exam dumps is good and valid.
UNITED KINGDOM
upvote