Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

A "Server-Side Includes" attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely.

Which web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?

Options:

A.

.stm


B.

.html


C.

.rss


D.

.cms


Expert Solution
Questions # 2:

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

Options:

A.

Kismet


B.

Abel


C.

Netstumbler


D.

Nessus


Expert Solution
Questions # 3:

What does the following command in netcat do?

nc -l -u -p 55555 < /etc/passwd

Options:

A.

Logs the incoming connections to /etc/passwd file


B.

Loads the /etc/passwd file to the UDP port 55555


C.

Grabs the /etc/passwd file when connected to UDP port 55555


D.

Deletes the /etc/passwd file when connected to the UDP port 55555


Expert Solution
Questions # 4:

Which among the following is the best example of the hacking concept called "clearing tracks"?

Options:

A.

After a system is breached, a hacker creates a backdoor to allow re-entry into a system.


B.

During a cyberattack, a hacker injects a rootkit into a server.


C.

An attacker gains access to a server through an exploitable vulnerability.


D.

During a cyberattack, a hacker corrupts the event logs on all machines.


Expert Solution
Questions # 5:

Which of the following program infects the system boot sector and the executable files at the same time?

Options:

A.

Polymorphic virus


B.

Stealth virus


C.

Multipartite Virus


D.

Macro virus


Expert Solution
Questions # 6:

which type of virus can change its own code and then cipher itself multiple times as it replicates?

Options:

A.

Stealth virus


B.

Tunneling virus


C.

Cavity virus


D.

Encryption virus


Expert Solution
Questions # 7:

You are a penetration tester working to test the user awareness of the employees of the client xyz. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?

Options:

A.

Reconnaissance


B.

Command and control


C.

Weaponization


D.

Exploitation


Expert Solution
Questions # 8:

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration?

alert tcp any any -> 192.168.100.0/24 21 (msg: “FTP on the network!”;)

Options:

A.

A firewall IPTable


B.

FTP Server rule


C.

A Router IPTable


D.

An Intrusion Detection System


Expert Solution
Questions # 9:

SQL injection (SQLi) attacks attempt to inject SQL syntax into web requests, which may Bypass authentication and allow attackers to access and/or modify data attached to a web application.

Which of the following SQLI types leverages a database server's ability to make DNS requests to pass data to an attacker?

Options:

A.

Union-based SQLI


B.

Out-of-band SQLI


C.

ln-band SQLI


D.

Time-based blind SQLI


Expert Solution
Questions # 10:

Why are containers less secure than virtual machines?

Options:

A.

Host OS on containers has a larger surface attack.


B.

Containers may fulfill disk space of the host.


C.

A compromised container may cause a CPU starvation of the host.


D.

Containers are attached to the same virtual network.


Expert Solution
Questions # 11:

Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil Corp’s lobby. He checks his current SID, which is:

S-1-5-21-1223352397-1872883824-861252104-501

What needs to happen before Matthew has full administrator access?

Options:

A.

He must perform privilege escalation.


B.

He needs to disable antivirus protection.


C.

He needs to gain physical access.


D.

He already has admin privileges, as shown by the “501” at the end of the SID.


Expert Solution
Questions # 12:

In the field of cryptanalysis, what is meant by a “rubber-hose” attack?

Options:

A.

Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.


B.

A backdoor placed into a cryptographic algorithm by its creator.


C.

Extraction of cryptographic secrets through coercion or torture.


D.

Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.


Expert Solution
Questions # 13:

Study the snort rule given below and interpret the rule:

alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msg: "mountd access";)

Options:

A.

An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111


B.

An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet


C.

An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet


D.

An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111


Expert Solution
Questions # 14:

Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?

Options:

A.

WPA3-Personal


B.

WPA2-Enterprise


C.

Bluetooth


D.

ZigBee


Expert Solution
Questions # 15:

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

Options:

A.

msfpayload


B.

msfcli


C.

msfd


D.

msfencode


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions