Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions
Questions # 1:

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical Information to Johnson's machine. What is the social engineering technique Steve employed in the above scenario?

Options:

A.

Quid pro quo


B.

Diversion theft


C.

Elicitation


D.

Phishing


Expert Solution
Questions # 2:

Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She

discovered a malicious program spread through the instant messenger application used by her team. The

attacker had obtained access to one of her teammate's messenger accounts and started sending files across

the contact list. Which best describes the attack scenario and what measure could have prevented it?

Options:

A.

Instant Messenger Applications; verifying the sender's identity before opening any files


B.

Insecure Patch Management; updating application software regularly


C.

Rogue/Decoy Applications; ensuring software is labeled as TRUSTED


D.

Portable Hardware Media/Removable Devices; disabling Autorun functionality


Expert Solution
Questions # 3:

Abel, a security professional, conducts penetration testing in his client organization to check for any security loopholes. He launched an attack on the DHCP servers by broadcasting forged DHCP requests and leased all the DHCP addresses available in the DHCP scope until the server could not issue any more IP addresses. This led to a Dos attack, and as a result, legitimate employees were unable to access the clients network. Which of the following attacks did Abel perform in the above scenario?

Options:

A.

VLAN hopping


B.

DHCP starvation


C.

Rogue DHCP server attack


D.

STP attack


Expert Solution
Questions # 4:

Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?

Options:

A.

Linux


B.

Unix


C.

OS X


D.

Windows


Expert Solution
Questions # 5:

What did the following commands determine?

[Image Output of USER2SID and SID2USER showing that SID ending in -500 corresponds to user Joe on domain EARTH]

Question # 5

Options:

A.

That the Joe account has a SID of 500


B.

These commands demonstrate that the guest account has NOT been disabled


C.

These commands demonstrate that the guest account has been disabled


D.

That the true administrator is Joe


E.

Issued alone, these commands prove nothing


Expert Solution
Questions # 6:

Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network. Which of the following Nmap commands must John use to perform the TCP SYN ping scan?

Options:

A.

nmap -sn -pp


B.

nmap -sn -PO


C.

nmap -sn -PS


D.

nmap -sn -PA


Expert Solution
Questions # 7:

Ethical backer jane Doe is attempting to crack the password of the head of the it department of ABC company. She Is utilizing a rainbow table and notices upon entering a password that extra characters are added to the password after submitting. What countermeasure is the company using to protect against rainbow tables?

Options:

A.

Password key hashing


B.

Password salting


C.

Password hashing


D.

Account lockout


Expert Solution
Questions # 8:

Given below are different steps involved in the vulnerability-management life cycle:

Remediation

Identify assets and create a baseline

Verification

Monitor

Vulnerability scan

Risk assessment

Identify the correct sequence of steps involved in vulnerability management.

Options:

A.

2 → 5 → 6 → 1 → 3 → 4


B.

2 → 1 → 5 → 6 → 4 → 3


C.

2 → 4 → 5 → 3 → 6 → 1


D.

1 → 2 → 3 → 4 → 5 → 6


Expert Solution
Questions # 9:

jane, an ethical hacker. Is testing a target organization's web server and website to identity security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site's directory structure, file structure, external links, images, web pages, and so on. This information helps jane map the website's directories and gain valuable information. What is the attack technique employed by Jane in the above scenario?

Options:

A.

website mirroring


B.

Session hijacking


C.

Web cache poisoning


D.

Website defacement


Expert Solution
Questions # 10:

As a cybersecurity professional, you are responsible for securing a high-traffic web application that uses MySQL as its backend database. Recently, there has been a surge of unauthorized login attempts, and you suspect that a seasoned black-hat hacker is behind them. This hacker has shown proficiency in SQL Injection and

appears to be using the 'UNION' SQL keyword to trick the login process into returning additional data.

However, your application's security measures include filtering special characters in user inputs, a method usually effective against such attacks. In this challenging environment, if the hacker still intends to exploit this SQL Injection vulnerability, which strategy is he most likely to employ?

Options:

A.

The hacker alters his approach and injects a ‘DROP TABLE’ statement, a move that could potentially lead to the loss of vital data stored in the application's database


B.

The hacker tries to manipulate the 'UNION' keyword in such a way that it triggers a database error, potentially revealing valuable information about the database's structure


C.

The hacker switches tactics and resorts to a ‘time-based blind’ SQL Injection attack, which would force the application to delay its response, thereby revealing information based on the duration of the delay


D.

The hacker attempts to bypass the special character filter by encoding his malicious input, which could potentially enable him to successfully inject damaging SQL queries


Expert Solution
Questions # 11:

During an investigation, an ethical hacker discovers that a web application’s API has been compromised, leading to unauthorized access and data manipulation. The attacker is using webhooks and a webshell. To prevent further exploitation, which of the following actions should be taken?

Options:

A.

Implement a Web Application Firewall (WAF) with rules to block webshell traffic and increase the logging verbosity of webhooks.


B.

Perform regular code reviews for the webhooks and modify the API to block connections from unknown IP addresses.


C.

Harden the web server security, add multi-factor authentication for API users, and restrict the execution of scripts server-side.


D.

Implement input validation on all API endpoints, review webhook payloads, and schedule regular scanning for webshells.


Expert Solution
Questions # 12:

Why explore the Deep Web during reconnaissance?

Options:

A.

Insider threats


B.

Physical attacker locations


C.

Learning hacking techniques


D.

Non-indexed company data exposure


Expert Solution
Questions # 13:

Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages, Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key (Km1) and a rotation key (Kr1) for performing its functions.

What is the algorithm employed by Harper to secure the email messages?

Options:

A.

CAST-128


B.

AES


C.

GOST block cipher


D.

DES


Expert Solution
Questions # 14:

Which action would most effectively increase the security of a virtual-hosted web server?

Options:

A.

Implement LAMP architecture


B.

Change IP addresses regularly


C.

Regularly update and patch server software


D.

Move document root to another disk


Expert Solution
Questions # 15:

BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from Active Directory.

What is this mechanism called in cryptography?

Options:

A.

Key archival


B.

Key escrow


C.

Certificate rollover


D.

Key renewal


Expert Solution
Questions # 16:

While performing a security audit of a web application, an ethical hacker discovers a potential vulnerability.

The application responds to logically incorrect queries with detailed error messages that divulge the underlying database's structure. The ethical hacker decides to exploit this vulnerability further. Which type of SQL Injection attack is the ethical hacker likely to use?

Options:

A.

UNION SQL Injection


B.

Blind/inferential SQL Injection


C.

In-band SQL Injection


D.

Error-based SOL Injection


Expert Solution
Questions # 17:

Which of the following statements is FALSE with respect to Intrusion Detection Systems?

Options:

A.

Intrusion Detection Systems can be configured to distinguish specific content in network packets


B.

Intrusion Detection Systems can easily distinguish a malicious payload in encrypted traffic


C.

Intrusion Detection Systems require constant update of the signature library


D.

Intrusion Detection Systems can examine the contents of the data in context of the network protocol


Expert Solution
Questions # 18:

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

Options:

A.

Man-in-the-middle attack


B.

Brute-force attack


C.

Dictionary attack


D.

Session hijacking


Expert Solution
Questions # 19:

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

Options:

A.

Overloading Port Address Translation


B.

Dynamic Port Address Translation


C.

Dynamic Network Address Translation


D.

Static Network Address Translation


Expert Solution
Questions # 20:

“ShadowFlee” is fileless malware using PowerShell and legitimate tools. Which strategy offers the most focused countermeasure?

Options:

A.

Restrict and monitor script and system tool execution


B.

Isolate systems and inspect traffic


C.

Schedule frequent reboots


D.

Clean temporary folders


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions