New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-89 Exam - Topic 5 Question 73 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 73
Topic #: 5
[All 212-89 Questions]

John is a professional hacker who is performing an attack on the target organization where he tries to redirect the connection between the IP address and its target server such that when the users type in the Internet address, it redirects them to a rogue website that resembles the original website. He tries this attack using cache poisoning technique. Identify the type of attack John is performing on the target organization.

Show Suggested Answer Hide Answer
Suggested Answer: C

WMIC (Windows Management Instrumentation Command-line) is a command-line tool that provides a unified interface for Windows management tasks, including the collection of system information. It allows administrators and forensic investigators to query the live system for information about running services, their process IDs, start modes, states, and statuses, among other data. The use of WMIC is particularly valuable in incident response scenarios for gathering volatile information from a system without having to install additional software, which might alter the state of the system being investigated. By executing specific WMIC commands, Clark can extract detailed information about the services running on a system at the time of the investigation, making it an essential tool for collecting volatile data in a forensically sound manner.


Contribute your Thoughts:

0/2000 characters
Aleta
3 months ago
I thought pretexting was more about social engineering, not this.
upvoted 0 times
...
Peggie
3 months ago
No way, it's not skimming!
upvoted 0 times
...
Beckie
3 months ago
Wait, isn't cache poisoning just a part of phishing?
upvoted 0 times
...
Delila
4 months ago
Totally agree, pharming is the right term here.
upvoted 0 times
...
Corrinne
4 months ago
That's definitely pharming!
upvoted 0 times
...
Gail
4 months ago
Pretexting sounds like social engineering, which doesn’t match this scenario. I’d go with pharming too.
upvoted 0 times
...
Andrew
4 months ago
I’m a bit confused. Isn’t skimming more about stealing card info? I don’t think that applies here.
upvoted 0 times
...
Junita
4 months ago
I remember studying cache poisoning, and it seems to fit with pharming. I think that's the right answer.
upvoted 0 times
...
Gerry
5 months ago
I think this might be pharming since it involves redirecting users to a fake site, but I'm not completely sure.
upvoted 0 times
...
Danica
5 months ago
Okay, let me think this through step-by-step. The attacker is trying to redirect the connection to a rogue website, and he's using cache poisoning. That sounds like a classic pharming attack to me. I'm feeling pretty confident about this one.
upvoted 0 times
...
Trina
5 months ago
Aha, I know this one! Based on the description, John is performing a pharming attack, where he's trying to redirect users to a fake website by poisoning the DNS cache. Gotta watch out for those sneaky hackers!
upvoted 0 times
...
Jose
5 months ago
Hmm, I'm a little confused on the specifics here. Is this a phishing attack or something more technical? I'll need to review my notes on different hacking techniques to be sure.
upvoted 0 times
...
Billi
5 months ago
This seems like a tricky one, but I think I can figure it out. The key details are about redirecting the connection and using cache poisoning, so I'm guessing it's some kind of DNS-related attack.
upvoted 0 times
...
Judy
9 months ago
Wait, is John the good guy or the bad guy here? I can never keep track of these hacking scenarios. Anyway, the answer is definitely Pharming, unless John is playing some sort of 4D chess with us.
upvoted 0 times
...
Royce
9 months ago
Haha, I bet John is the 'professional hacker' we all wish we could be. But in all seriousness, this is clearly a Pharming attack, and I'm glad I remembered that from the study materials.
upvoted 0 times
Gianna
8 months ago
Absolutely, staying informed is key in cybersecurity
upvoted 0 times
...
Jaime
8 months ago
It's important to be aware of these types of attacks to protect ourselves
upvoted 0 times
...
Jeffrey
9 months ago
Yes, John is definitely skilled in what he does
upvoted 0 times
...
Mitsue
9 months ago
Pharming attack
upvoted 0 times
...
...
Beula
10 months ago
Ah, I was thinking it might be Skimming at first, but the description of redirecting users to a rogue website sounds more like Pharming. Good catch on the cache poisoning part!
upvoted 0 times
Shawnta
9 months ago
D) Pretexting
upvoted 0 times
...
Hoa
9 months ago
C) Skimming
upvoted 0 times
...
Pearlie
9 months ago
B) Pharming
upvoted 0 times
...
Mendy
9 months ago
A) War driving
upvoted 0 times
...
...
Clay
10 months ago
I agree with both of you. Pharming is the correct answer because John is manipulating the DNS cache to redirect users to a malicious website.
upvoted 0 times
...
Nida
10 months ago
This definitely sounds like Pharming to me. Cache poisoning is a classic Pharming attack technique, where the attacker redirects users to a fake website instead of the real one.
upvoted 0 times
Nobuko
9 months ago
Pharming is a serious threat to organizations as it can lead to sensitive information being stolen by attackers.
upvoted 0 times
...
Pa
9 months ago
I agree, John is definitely performing a Pharming attack by using cache poisoning to redirect users to a fake website.
upvoted 0 times
...
...
Miesha
10 months ago
I think John is definitely performing a Pharming attack. It's a common technique used by hackers to redirect users to fake websites.
upvoted 0 times
...
Shannon
11 months ago
B) Pharming - John is redirecting users to a rogue website that resembles the original one.
upvoted 0 times
...

Save Cancel