Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 21-40 out of questions
Questions # 21:

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?

Options:

A.

Behavioral based


B.

Heuristics based


C.

Honeypot based


D.

Cloud based


Expert Solution
Questions # 22:

Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the Integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT. POST. GET. and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario?

Options:

A.

JSON-RPC


B.

SOAP API


C.

RESTful API


D.

REST API


Expert Solution
Questions # 23:

Which WPA2 vulnerability allows packet interception and replay?

Options:

A.

Hole196 vulnerability


B.

KRACK vulnerability


C.

WPS PIN recovery


D.

Weak RNG


Expert Solution
Questions # 24:

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.

What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

Options:

A.

Public


B.

Private


C.

Shared


D.

Root


Expert Solution
Questions # 25:

You are a cybersecurity consultant for a global organization. The organization has adopted a Bring Your Own Device (BYOD)policy, but they have recently experienced a phishing incident where an employee's device was compromised. In the investigation, you discovered that the phishing attack occurred through a third-party email app that the employee had installed. Given the need to balance security and user autonomy under the BYOD policy, how should the organization mitigate the risk of such incidents? Moreover, consider a measure that would prevent similar attacks without overly restricting the use of personal devices.

Options:

A.

Provide employees with corporate-owned devices for work-related tasks.


B.

Implement a mobile device management solution that restricts the installation of non-approved applications.


C.

Require all employee devices to use a company-provided VPN for internet access.


D.

Conduct regular cybersecurity awareness training, focusing on phishing attacks.


Expert Solution
Questions # 26:

To create a botnet. the attacker can use several techniques to scan vulnerable machines. The attacker first collects Information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list Is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.

Which technique is discussed here?

Options:

A.

Hit-list-scanning technique


B.

Topological scanning technique


C.

Subnet scanning technique


D.

Permutation scanning technique


Expert Solution
Questions # 27:

What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?

Options:

A.

Performing content enumeration on the web server to discover hidden folders


B.

Using wget to perform banner grabbing on the web server


C.

Flooding the web server with requests to perform a DoS attack


D.

Downloading all the contents of the web page locally for further examination


Expert Solution
Questions # 28:

While browsing his Facebook feed, Matt sees a picture one of his friends posted with the caption, "Learn more about your friends!", along with a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate, Matt responds to the questions in the post. A few days later, Matt's bank account has been accessed, and the password has been changed. What most likely happened?

Options:

A.

Matt inadvertently provided the answers to his security questions when responding to the post.


B.

Matt's bank account login information was brute forced.


C.

Matt inadvertently provided his password when responding to the post.


D.

Matt's computer was infected with a keylogger.


Expert Solution
Questions # 29:

A penetration tester completes a vulnerability scan showing multiple low-risk findings and one high-risk vulnerability tied to outdated server software. What should the tester prioritize as the next step?

Options:

A.

Perform a brute-force attack on the server to gain access


B.

Ignore the high-risk vulnerability and proceed with testing other systems


C.

Focus on exploiting the low-risk vulnerabilities first


D.

Verify if the high-risk vulnerability is exploitable by checking for known exploits


Expert Solution
Questions # 30:

John is an incident handler at a financial institution. His steps in a recent incident are not up to the standards of the company. John frequently forgets some steps and procedures while handling responses as they are very stressful to perform. Which of the following actions should John take to overcome this problem with the least administrative effort?

Options:

A.

Create an incident checklist.


B.

Select someone else to check the procedures.


C.

Increase his technical skills.


D.

Read the incident manual every time it occurs.


Expert Solution
Questions # 31:

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

Options:

A.

Birthday


B.

Brute force


C.

Man-in-the-middle


D.

Smurf


Expert Solution
Questions # 32:

A penetration tester suspects that a web application's user profile page is vulnerable to SQL injection, as it uses the userID parameter in SQL queries without proper sanitization. Which technique should the tester use to confirm the vulnerability?

Options:

A.

Use the userID parameter to perform a brute-force attack on the admin login page


B.

Modify the userID parameter in the URL to ' OR '1'='1 and check if it returns multiple profiles


C.

Inject HTML code into the userID parameter to test for Cross-Site Scripting (XSS)


D.

Attempt a directory traversal attack using the userID parameter


Expert Solution
Questions # 33:

During a red team operation on a segmented enterprise network, the testers discover that the organization’s perimeter devices deeply inspect only connection-initiation packets (such as TCP SYN and HTTP requests). Response packets and ACK packets within established sessions, however, are minimally inspected. The red team needs to covertly transmit payloads to an internal compromised host by blending into normal session traffic. Which approach should they take to bypass these defensive mechanisms?

Options:

A.

Port knocking


B.

SYN scanning


C.

ICMP flooding


D.

ACK tunneling


Expert Solution
Questions # 34:

Jack, a professional hacker, targets an organization and performs vulnerability scanning on the target web server to identify any possible weaknesses, vulnerabilities, and misconfigurations. In this process, Jack uses an automated tool that eases his work and performs vulnerability scanning to find hosts, services, and other vulnerabilities in the target server.

Which of the following tools is used by Jack to perform vulnerability scanning?

Options:

A.

Infoga


B.

WebCopier Pro


C.

Netsparker


D.

NCollector Studio


Expert Solution
Questions # 35:

While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to determine whether the firewall is stateful or stateless, which of the following options would be best to use?

Options:

A.

-sA


B.

-sX


C.

-sT


D.

-sF


Expert Solution
Questions # 36:

Widespread fraud ac Enron. WorldCom, and Tyco led to the creation of a law that was designed to improve the accuracy and accountability of corporate disclosures. It covers accounting firms and third parties that provide financial services to some organizations and came into effect in 2002. This law is known by what acronym?

Options:

A.

Fed RAMP


B.

PCIDSS


C.

SOX


D.

HIPAA


Expert Solution
Questions # 37:

An attacker impersonates a technician and gains physical access to restricted areas. What tactic is this?

Options:

A.

Help desk impersonation


B.

Dumpster diving


C.

Remote tech support scam


D.

Physical impersonation (Tailgating/Impersonation)


Expert Solution
Questions # 38:

Malware uses Background Intelligent Transfer Service (BITS) to evade detection. Why is BITS attractive to attackers?

Options:

A.

It uses IP fragmentation


B.

It encrypts DNS packets


C.

It looks like normal Windows Update traffic


D.

It works only through HTTP tunneling


Expert Solution
Questions # 39:

As an IT security analyst, you perform network scanning using ICMP Echo Requests. During the scan, several IP addresses do not return Echo Replies, yet other network services remain operational. How should this situation be interpreted?

Options:

A.

The non-responsive IP addresses indicate severe network congestion.


B.

A firewall or security control is likely blocking ICMP Echo Requests.


C.

The lack of Echo Replies indicates an active security breach.


D.

The IP addresses are unused and available for reassignment.


Expert Solution
Questions # 40:

A penetration tester is assessing a web application that employs secure, HTTP-only cookies, regenerates session IDs upon login, and uses strict session timeout policies. To hijack a user's session without triggering the application's security defenses, which advanced technique should the tester utilize?

Options:

A.

Perform a session token prediction by analyzing session ID entropy and patterns


B.

Conduct a network-level man-in-the-middle attack to intercept and reuse session tokens


C.

Execute a Cross-Site Request Forgery (CSRF) attack to manipulate session states


D.

Implement a session fixation strategy by pre-setting a session ID before user authentication


Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 21-40 out of questions