New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 16-30 out of questions
Questions # 16:

Sam, a professional hacker. targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS 1AM credentials and further compromise the employee's account. What is the technique used by Sam to compromise the AWS IAM credentials?

Options:

A.

Social engineering


B.

insider threat


C.

Password reuse


D.

Reverse engineering


Expert Solution
Questions # 17:

A cybersecurity analyst in an organization is using the Common Vulnerability Scoring System to assess and prioritize identified vulnerabilities in their IT infrastructure. They encountered a vulnerability with a base metric score of 7, a temporal metric score of 8, and an environmental metric score of 5. Which statement best describes this scenario?

Options:

A.

The vulnerability has a medium severity with a high likelihood of exploitability over time and a considerable impact in their specific environment


B.

The vulnerability has a medium severity with a diminishing likelihood of exploitability over time, but a significant impact in their specific environment


C.

The vulnerability has an overall high severity with a diminishing likelihood of exploitability over time, but it is less impactful in their specific environment


D.

The vulnerability has an overall high severity, the likelihood of exploitability is increasing over time, and it has a medium impact in their specific environment


Expert Solution
Questions # 18:

What piece of hardware on a computer's motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?

Options:

A.

CPU


B.

GPU


C.

UEFI


D.

TPM


Expert Solution
Questions # 19:

A financial institution's online banking platform is experiencing intermittent downtime caused by a sophisticated DDoS attack that combines SYN floods and HTTP GET floods from a distributed botnet. Standard firewalls and load balancers cannot mitigate the attack without affecting legitimate users. To protect their infrastructure and maintain service availability, which advanced mitigation strategy should the institution implement?

Options:

A.

Configure firewalls to block all incoming SYN and HTTP requests from external IPs


B.

Increase server bandwidth and apply basic rate limiting on incoming traffic


C.

Deploy an Intrusion Prevention System (IPS) with deep packet inspection capabilities


D.

Utilize a cloud-based DDoS protection service that offers multi-layer traffic scrubbing and auto-scaling


Expert Solution
Questions # 20:

The following is an entry captured by a network IDS. You are assigned the task of analyzing this entry.

You notice the value 0x90, which is the most common NOOP instruction for the Intel processor.

You also notice "/bin/sh" in the ASCII part of the output.

As an analyst, what would you conclude about the attack?

Question # 20

Options:

A.

The buffer overflow attack has been neutralized by the IDS


B.

The attacker is creating a directory on the compromised machine


C.

The attacker is attempting a buffer overflow attack and has succeeded


D.

The attacker is attempting an exploit that launches a command-line shell


Expert Solution
Questions # 21:

E-mail scams and mail fraud are regulated by which of the following?

Options:

A.

18 U.S.C. §1030 – Fraud and Related Activity in Connection with Computers


B.

18 U.S.C. §1029 – Fraud and Related Activity in Connection with Access Devices


C.

18 U.S.C. §1362 – Communication Lines, Stations, or Systems


D.

18 U.S.C. §2510 – Wire and Electronic Communications Interception and Interception of Oral Communication


Expert Solution
Questions # 22:

OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?

Options:

A.

openssl s_client -site www.website.com:443


B.

openssl_client -site www.website.com:443


C.

openssl s_client -connect www.website.com:443


D.

openssl_client -connect www.website.com:443


Expert Solution
Questions # 23:

A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior 10 the Intrusion. This Is likely a failure in which of the following security processes?

Options:

A.

vendor risk management


B.

Security awareness training


C.

Secure deployment lifecycle


D.

Patch management


Expert Solution
Questions # 24:

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to. 1.4.0/23. Which of the following IP addresses could be teased as a result of the new configuration?

Options:

A.

210.1.55.200


B.

10.1.4.254


C.

10.1.5.200


D.

10.1.4.156


Expert Solution
Questions # 25:

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration?

alert tcp any any -> 192.168.100.0/24 21 (msg: “FTP on the network!”;)

Options:

A.

A firewall IPTable


B.

FTP Server rule


C.

A Router IPTable


D.

An Intrusion Detection System


Expert Solution
Questions # 26:

Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil Corp’s lobby. He checks his current SID, which is:

S-1-5-21-1223352397-1872883824-861252104-501

What needs to happen before Matthew has full administrator access?

Options:

A.

He must perform privilege escalation.


B.

He needs to disable antivirus protection.


C.

He needs to gain physical access.


D.

He already has admin privileges, as shown by the “501” at the end of the SID.


Expert Solution
Questions # 27:

Which of the following is the BEST way to defend against network sniffing?

Options:

A.

Using encryption protocols to secure network communications


B.

Register all machines MAC Address in a Centralized Database


C.

Use Static IP Address


D.

Restrict Physical Access to Server Rooms hosting Critical Servers


Expert Solution
Questions # 28:

A penetration tester has gained access to a target system using default credentials. What is the most effective next step to escalate privileges on the system?

Options:

A.

Perform a denial-of-service (DoS) attack to crash the system


B.

Use a known local privilege escalation vulnerability to gain admin access


C.

Execute a Cross-Site Scripting (XSS) attack on the system's login page


D.

Use a dictionary attack to brute-force the root password


Expert Solution
Questions # 29:

You are a cybersecurlty consultant for a smart city project. The project involves deploying a vast network of loT devices for public utilities like traffic control, water supply, and power grid management The city administration is concerned about the possibility of a Distributed Denial of Service (DDoS) attack crippling these critical services. They have asked you for advice on how to prevent such an attack. What would be your primary recommendation?

Options:

A.

Implement regular firmware updates for all loT devices.


B.

A Deploy network intrusion detection systems (IDS) across the loT network.


C.

Establish strong, unique passwords for each loT device.


D.

Implement IP address whitelisting for all loT devices.


Expert Solution
Questions # 30:

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

Options:

A.

Social engineering


B.

Piggybacking


C.

Tailgating


D.

Eavesdropping


Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 16-30 out of questions