New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-15 out of questions
Questions # 1:

During a reconnaissance mission, an ethical hacker uses Maltego, a popular footprinting tool, to collect information about a target organization. The information includes the target's Internet infrastructure details (domains, DNS names, Netblocks, IP address information). The hacker decides to use social engineering

techniques to gain further information. Which of the following would be the least likely method of social engineering to yield beneficial information based on the data collected?

Options:

A.

Shoulder surfing to observe sensitive credentials input on the target's computers


B.

Impersonating an ISP technical support agent to trick the target into providing further network details


C.

Dumpster diving in the target company’s trash bins for valuable printouts


D.

Eavesdropping on internal corporate conversations to understand key topics


Expert Solution
Questions # 2:

Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. Using this technique, he also imposed conditions such that employees can access only the resources required for their role.

What is the technique employed by Eric to secure cloud resources?

Options:

A.

Serverless computing


B.

Demilitarized zone


C.

Container technology


D.

Zero trust network


Expert Solution
Questions # 3:

Based on the below log, which of the following sentences are true?

Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip

Options:

A.

Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server.


B.

Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the client.


C.

SSH communications are encrypted; it’s impossible to know who is the client or the server.


D.

Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server.


Expert Solution
Questions # 4:

A malicious user has acquired a Ticket Granting Service from the domain controller using a valid user's Ticket Granting Ticket in a Kerberoasting attack. He exhorted the TGS tickets from memory for offline cracking. But the attacker was stopped before he could complete his attack. The system administrator needs to investigate and remediate the potential breach. What should be the immediate step the system administrator takes?

Options:

A.

Perform a system reboot to clear the memory


B.

Delete the compromised user's account


C.

Change the NTLM password hash used to encrypt the ST


D.

invalidate the TGS the attacker acquired


Expert Solution
Questions # 5:

During a security assessment, an attacker identifies a flaw in a multi-user file system. The system first verifies access rights to a temporary file created by a user. However, immediately after this verification, and before the file is processed, the attacker manages to swap the original file with a malicious version. This manipulation happens in the brief interval between the system's access verification and the moment it handles the file, resulting in the malicious file being treated as legitimate. Which vulnerability is the attacker exploiting?

Options:

A.

Time-of-validation/time-of-execution issue in resource management logic.


B.

Improper certificate validation in trusted communication channels.


C.

Integer overflow during arithmetic computations with limited memory bounds.


D.

Null pointer dereference leading to unexpected application behavior.


Expert Solution
Questions # 6:

Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in the application she is working on. She utilizes a component that can process API requests and handle various Docker objects, such as containers, volumes. Images, and networks. What is the component of the Docker architecture used by Annie in the above scenario?

Options:

A.

Docker client


B.

Docker objects


C.

Docker daemon


D.

Docker registries


Expert Solution
Questions # 7:

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

Options:

A.

PEM


B.

ppp


C.

IPSEC


D.

SET


Expert Solution
Questions # 8:

A security analyst investigates unusual east-west traffic on a corporate network. A rogue device has been physically inserted between a workstation and the switch, enabling unauthorized access while inheriting the workstation’s authenticated network state. Which evasion technique is being used?

Options:

A.

Exploiting a wireless rogue access point to tunnel through the firewall


B.

NAC bypass using a pre-authenticated device for network bridging


C.

Spoofing ARP responses from a dynamic IP allocation pool


D.

VLAN double tagging to shift between network segments


Expert Solution
Questions # 9:

The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?

Options:

A.

ACK


B.

SYN


C.

RST


D.

SYN-ACK


Expert Solution
Questions # 10:

John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the IDAP service for sensitive information such as usernames. addresses, departmental details, and server names to launch further attacks on the target organization.

What is the tool employed by John to gather information from the IDAP service?

Options:

A.

jxplorer


B.

Zabasearch


C.

EarthExplorer


D.

Ike-scan


Expert Solution
Questions # 11:

Which of the following best describes the role of a penetration tester?

Options:

A.

A security professional hired to identify and exploit vulnerabilities with permission


B.

A developer who writes malicious code for cyberattacks


C.

A hacker who gains unauthorized access to systems for malicious purposes


D.

A hacker who spreads malware to compromise systems


Expert Solution
Questions # 12:

A penetration tester is assessing a company's executive team for vulnerability to sophisticated social engineering attacks by impersonating a trusted vendor and leveraging internal communications. What is the most effective social engineering technique to obtain sensitive executive credentials without being detected?

Options:

A.

Develop a fake social media profile to connect with executives and request private information


B.

Conduct a phone call posing as the CEO to request immediate password changes


C.

Create a targeted spear-phishing email that references recent internal projects and requests credential verification


D.

Send a mass phishing email with a malicious link disguised as a company-wide update


Expert Solution
Questions # 13:

As a budding cybersecurity enthusiast, you have set up a small lab at home to learn more about wireless

network security. While experimenting with your home Wi-Fi network, you decide to use a well-known

hacking tool to capture network traffic and attempt to crack the Wi-Fi password. However, despite many

attempts, you have been unsuccessful. Your home Wi-Fi network uses WPA2 Personal with AES encryption.

Why are you finding it difficult to crack the Wi-Fi password?

Options:

A.

The Wi-Fi password is too complex and long


B.

Your hacking tool is outdated


C.

The network is using an uncrackable encryption method


D.

The network is using MAC address filtering.


Expert Solution
Questions # 14:

Taylor, a security professional, uses a tool to monitor her company's website, analyze the website's traffic, and track the geographical location of the users visiting the company's website. Which of the following tools did Taylor employ in the above scenario?

Options:

A.

WebSite Watcher


B.

web-Stat


C.

Webroot


D.

WAFW00F


Expert Solution
Questions # 15:

Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

Options:

A.

inurl:


B.

related:


C.

info:


D.

site:


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-15 out of questions