312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 46


Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

Show Answer
Correct Answer: B

Infecting a system with malware and using phishing to gain credentials to a system or web application are actions that are typically associated with the phase of gaining access in the ethical hacking methodology. This phase involves the attempt to gain unauthorized access to a target system or network by exploiting vulnerabilities and weaknesses.

Discussion

7 comments
Sign in to comment
eli117Option: B
Apr 4, 2023

B. Gaining access Explanation: The ethical hacking methodology consists of five phases, which are: reconnaissance, scanning, gaining access, maintaining access, and covering tracks. The phase that involves infecting a system with malware and using phishing to gain credentials to a system or web application is the gaining access phase. In this phase, the attacker attempts to gain unauthorized access to the target system or network by exploiting vulnerabilities, misconfigurations, or weaknesses in the security controls.

jeremy13Option: B
May 3, 2023

B. Gaining access

581777aOption: B
Aug 4, 2023

B. Gaining access Most Voted

insaniuntOption: B
Dec 11, 2023

B. Gaining access

sosindiOption: B
Jan 29, 2024

B. Gaining access

duke_of_kamuluOption: B
Nov 26, 2024

Gaining access

Mann098Option: B
Dec 30, 2024

Gaining access