Free 312-85 Exam Braindumps (page: 4)

Page 4 of 13

A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of a connection request from a remote host to the server. From this data, he obtains only the IP address of the source and destination but no contextual information. While processing this data, he obtains contextual information stating that multiple connection requests from different geo-locations are received by the server within a short time span, and as a result, the server is stressed and gradually its performance has reduced. He further performed analysis on the information based on the past and present experience and concludes the attack experienced by the client organization.

Which of the following attacks is performed on the client organization?

  1. DHCP attacks
  2. MAC spoofing attack
  3. Distributed Denial-of-Service (DDoS) attack
  4. Bandwidth attack

Answer(s): C



Jame, a professional hacker, is trying to hack the confidential information of a target organization. He identified the vulnerabilities in the target system and created a tailored deliverable malicious payload using an exploit and a backdoor to send it to the victim.
Which of the following phases of cyber kill chain methodology is Jame executing?

  1. Reconnaissance
  2. Installation
  3. Weaponization
  4. Exploitation

Answer(s): C



Steve works as an analyst in a UK-based firm. He was asked to perform network monitoring to find any evidence of compromise. During the network monitoring, he came to know that there are multiple logins from different locations in a short time span. Moreover, he also observed certain irregular log in patterns from locations where the organization does not have business relations. This resembles that somebody is trying to steal confidential information.
Which of the following key indicators of compromise does this scenario present?

  1. Unusual outbound network traffic
  2. Unexpected patching of systems
  3. Unusual activity through privileged user account
  4. Geographical anomalies

Answer(s): C



Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target’s network?

  1. Risk tolerance
  2. Timeliness
  3. Attack origination points
  4. Multiphased

Answer(s): C



Page 4 of 13



Post your Comments and Discuss EC-Council 312-85 exam with other Community members:

Kamekar commented on May 25, 2024
Passed this exam on May 19. This exam dumps is good and valid.
UNITED KINGDOM
upvote