Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

A penetration tester is hired by a company to assess its vulnerability to social engineering attacks targeting its IT department. The tester decides to use a sophisticated pretext involving technical jargon and insider information to deceive employees into revealing their network credentials. What is the most effective social engineering technique the tester should employ to maximize the chances of obtaining valid credentials without raising suspicion?

Options:

A.

Conduct a phone call posing as a high-level executive requesting urgent password resets


B.

Send a generic phishing email with a malicious attachment to multiple employees


C.

Create a convincing fake IT support portal that mimics the company ' s internal systems


D.

Visit the office in person as a maintenance worker to gain physical access to terminals


Expert Solution
Questions # 2:

Which WPA2 vulnerability allows packet interception and replay?

Options:

A.

Hole196 vulnerability


B.

KRACK vulnerability


C.

WPS PIN recovery


D.

Weak RNG


Expert Solution
Questions # 3:

You are Alex, a forensic responder at HarborHealth in Seattle, Washington. During a live incident response you must secure an enterprise Windows server ' s system partition and attached data volumes without rebooting user machines or disrupting domain authentication. The IT team prefers a solution that integrates with Windows platform features (including hardware-backed startup protection and centralized key escrow via Active Directory/management policies) and provides transparent full-disk protection for the OS volume. Which disk-encryption solution should you deploy?

Options:

A.

FileVault


B.

BitLocker Drive Encryption


C.

VeraCrypt


D.

Rohos Disk Encryption


Expert Solution
Questions # 4:

A security analyst is tasked with gathering detailed information about an organization ' s network infrastructure without making any direct contact that could be logged or trigger alarms. Which method should the analyst use to obtain this information covertly?

Options:

A.

Examine leaked documents or data dumps related to the organization


B.

Use network mapping tools to scan the organization ' s IP range


C.

Initiate social engineering attacks to elicit information from employees


D.

Perform a DNS brute-force attack to discover subdomains


Expert Solution
Questions # 5:

During a routine security audit, administrators discover that cloud storage backups were illegally accessed and modified. Which countermeasure would most directly mitigate such incidents in the future?

Options:

A.

Implementing resource auto-scaling


B.

Regularly conducting SQL injection testing


C.

Deploying biometric entry systems


D.

Adopting the 3-2-1 backup model


Expert Solution
Questions # 6:

During an internal assessment, a penetration tester gains access to a hash dump containing NTLM password hashes from a compromised Windows system. To crack the passwords efficiently, the tester uses a high-performance CPU setup with Hashcat, attempting millions of password combinations per second. Which technique is being optimized in this scenario?

Options:

A.

Spoof NetBIOS to impersonate a file server


B.

Leverage hardware acceleration for cracking speed


C.

Dump SAM contents for offline password retrieval


D.

Exploit dictionary rules with appended symbols


Expert Solution
Questions # 7:

A large media-streaming company receives complaints that its web application is timing out or failing to load. Security analysts observe the web server is overwhelmed with a large number of open HTTP connections, transmitting data extremely slowly. These connections remain open indefinitely, exhausting server resources without consuming excessive bandwidth. The team suspects an application-layer DoS attack. Which attack is most likely responsible?

Options:

A.

A UDP flooding attack targeting random ports.


B.

An ICMP Echo Request flooding attack.


C.

A Slowloris attack that keeps numerous HTTP connections open to exhaust server resources.


D.

A fragmented packet attack with overlapping offset values.


Expert Solution
Questions # 8:

A penetration tester identifies malware on a system that hides its presence and gives an attacker access to administrative functions without being detected. What type of malware is this?

Options:

A.

Virus


B.

Keylogger


C.

Ransomware


D.

Rootkit


Expert Solution
Questions # 9:

A city’s power management system relies on SCADA infrastructure. Recent anomalies include inconsistent sensor readings and intermittent outages. Security analysts suspect a side-channel attack designed to extract sensitive information covertly from SCADA devices. Which investigative technique would best confirm this type of attack?

Options:

A.

Measuring unusual physical or electrical fluctuations during device operation at the hardware level.


B.

Identifying weak cryptographic configurations in device communications.


C.

Assessing SCADA user interfaces for unauthorized access or misuse.


Expert Solution
Questions # 10:

During a targeted phishing campaign, a malicious HTML attachment reconstructs malware locally using obfuscated JavaScript without making external network calls, bypassing firewalls and IDS inspection. Which evasion technique is being employed?

Options:

A.

HTML smuggling


B.

Port forwarding


C.

Cross-site scripting


D.

HTTP header spoofing


Expert Solution
Questions # 11:

At Liberty Mutual ' s cybersecurity operations center in Boston, network engineer Marcus is troubleshooting a critical issue during peak transaction hours. Multiple VLANs are experiencing intermittent access delays, and several endpoints including those on isolated VLANs are receiving network traffic not intended for them, raising concerns about data exposure. Marcus notices that the issue began after a newly imaged workstation used by an intern named Lisa was connected to a trunk port in the server room. Switch logs indicate abnormal traffic patterns overwhelming the network.

Which sniffing technique is Lisa ' s workstation most likely using to cause this behavior?

Options:

A.

DNS Cache Poisoning


B.

ARP Poisoning


C.

MAC Flooding


D.

Switch Port Stealing


Expert Solution
Questions # 12:

As a security analyst, you are testing a company’s network for potential vulnerabilities. You suspect an attacker may be using MAC flooding to compromise network switches and sniff traffic. Which of the following indicators would most likely confirm your suspicion?

Options:

A.

An increased number of ARP requests in network traffic.


B.

Multiple MAC addresses assigned to a single IP address.


C.

Multiple IP addresses assigned to a single MAC address.


D.

Numerous MAC addresses associated with a single switch port.


Expert Solution
Questions # 13:

Malware infecting multiple systems remains dormant until triggered and changes its code or encryption with each infection to evade detection. Which malware type best fits this description, and what is the most effective mitigation?

Options:

A.

Rootkit – use anti-rootkit tools and patch systems


B.

Adware – deploy anti-adware tools and train users


C.

Worm – isolate infected systems and scan the network


D.

Polymorphic malware – use behavior-based detection and ensure systems are patched


Expert Solution
Questions # 14:

A financial services firm is experiencing a sophisticated DoS attack on their DNS servers using DNS amplification and on their web servers using HTTP floods. Traditional firewall rules and IDS are failing to mitigate the attack effectively. To protect their infrastructure without impacting legitimate users, which advanced mitigation strategy should the firm implement?

Options:

A.

Increase server capacity and implement simple rate limiting


B.

Block all incoming traffic from suspicious IP ranges using access control lists


C.

Deploy a Web Application Firewall (WAF) to filter HTTP traffic


D.

Utilize a cloud-based DDoS protection service with traffic scrubbing capabilities


Expert Solution
Questions # 15:

Which advanced session hijacking technique is the most difficult to detect and mitigate?

Options:

A.

Credential stuffing


B.

Clickjacking


C.

CSRF


D.

Session replay attack


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions