ExamGecko
Question list
Search
Search

Related questions











Question 425 - 312-50v12 discussion

Report
Export

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Joel in the above scenario?

A.
DNS rebinding attack
Answers
A.
DNS rebinding attack
B.
Clickjacking attack
Answers
B.
Clickjacking attack
C.
MarioNet attack
Answers
C.
MarioNet attack
D.
Watering hole attack
Answers
D.
Watering hole attack
Suggested answer: D

Explanation:

Web Application Threats - Watering Hole Attack In a watering hole attack, the attacker identifies the kinds of websites a target company/individual frequently surfs and tests those particular websites to identify any possible vulnerabilities.

Attacker injects malicious script/code into the web application that can redirect the webpage and download malware onto the victim machine. (P.1797/1781)

asked 18/09/2024
Mark Anthony Mondonedo
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first