Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions
Questions # 16:

Why is using Google Hacking justified during passive footprinting?

Options:

A.

Identifying weaknesses in website source code


B.

Locating phishing sites mimicking the organization


C.

Mapping internal network structures


D.

Discovering hidden organizational data indexed by search engines


Expert Solution
Questions # 17:

During an internal security assessment of a medium-sized enterprise network, a security analyst notices an unusual spike in ARP traffic. Closer inspection reveals that one particular MAC address is associated with multiple IP addresses across different subnets. The ARP packets were unsolicited replies rather than requests, and several employees from different departments have reported intermittent connection drops, failed logins, and broken intranet sessions. The analyst suspects an intentional interference on the local network segment. What is the most likely cause of this abnormal behavior?

Options:

A.

ARP poisoning causing routing inconsistencies


B.

DHCP snooping improperly configured


C.

Legitimate ARP table refresh on all clients


D.

Port security restricting all outbound MAC responses


Expert Solution
Questions # 18:

A Certified Ethical Hacker (CEH) is auditing a company’s web server that employs virtual hosting. The server hosts multiple domains and uses a web proxy to maintain anonymity and prevent IP blocking. The CEH discovers that the server’s document directory (containing critical HTML files) is named “certrcx” and stored in /admin/web. The server root (containing configuration, error, executable, and log files) is also identified. The CEH also notes that the server uses a virtual document tree for additional storage. Which action would most likely increase the security of the web server?

Options:

A.

Moving the document root directory to a different disk


B.

Regularly updating and patching the server software


C.

Changing the server’s IP address regularly


D.

Implementing an open-source web server architecture such as LAMP


Expert Solution
Questions # 19:

During a stealth assessment, an attacker exploits intermittent delays in ARP responses from a target system. By injecting fake ARP replies before legitimate ones, the attacker temporarily redirects traffic to their own device, allowing intermittent packet capture. What type of sniffing attack is occurring?

Options:

A.

Passive sniffing on a switched network


B.

Duplicate IP conflict resolution attack


C.

Switch port stealing via timing-based ARP spoofing


D.

ARP poisoning for MiTM interception


Expert Solution
Questions # 20:

During a reconnaissance engagement at a law firm in Houston, Texas, you are tasked with analyzing the physical movement of employees through their publicly shared media. By examining geotagged images and mapping them to specific locations, you aim to evaluate whether staff are unintentionally disclosing sensitive information about office routines. Which tool from the reconnaissance toolkit would best support this task?

Options:

A.

Creepy


B.

Social Searcher


C.

Sherlock


D.

Maltego


Expert Solution
Questions # 21:

A penetration tester is assessing an organization ' s cloud infrastructure and discovers misconfigured IAM policies on storage buckets. The IAM settings grant read and write permissions to any authenticated user. What is the most effective way to exploit this misconfiguration?

Options:

A.

Use leaked API keys to access the cloud storage buckets and exfiltrate data


B.

Execute a SQL injection attack on the organization ' s website to retrieve sensitive information


C.

Create a personal cloud account to authenticate and access the misconfigured storage buckets


D.

Perform a Cross-Site Scripting (XSS) attack on the cloud management portal to gain access


Expert Solution
Questions # 22:

Multiple internal workstations and IoT devices are compromised and transmitting large volumes of traffic to numerous external targets under botnet control. Which type of denial-of-service attack best describes this situation?

Options:

A.

An attack where compromised internal devices participate in a botnet and flood external targets


B.

An attack relying on spoofed IP addresses to trick external servers


C.

A direct botnet flood without spoofing intermediary services


D.

An internal amplification attack using spoofed DNS responses


Expert Solution
Questions # 23:

A penetration tester is attacking a wireless network running WPA3 encryption. Since WPA3 handshake protections prevent offline brute-force cracking, what is the most effective approach?

Options:

A.

Downgrade the connection to WPA2 and capture the handshake to crack the key


B.

Execute a dictionary attack on the WPA3 handshake using common passwords


C.

Perform a brute-force attack directly on the WPA3 handshake


D.

Perform a SQL injection attack on the router ' s login page


Expert Solution
Questions # 24:

During a red team assessment at Sunshine Credit Union in Miami, ethical hacker Laura demonstrates a weakness in the company ' s session handling process. She shows that once a user logs in, the same authentication token assigned before login continues to be valid without being refreshed. Laura explains that an attacker could exploit this flaw by tricking a victim into authenticating with a value already known to the attacker, gaining access afterward. To mitigate this risk, the IT team agrees to apply a countermeasure focused on proper session lifecycle management.

Which countermeasure should the IT team implement?

Options:

A.

Implement SSL to encrypt all information in transit via the network


B.

Use restrictive cache directives for all the web traffic through HTTP and HTTPS


C.

Regenerate the session ID after a successful login to prevent session fixation attacks


D.

Do not create sessions for unauthenticated users unless necessary


Expert Solution
Questions # 25:

During network analysis, clients are receiving incorrect gateway and DNS settings due to a rogue DHCP server. What security feature should the administrator enable to prevent this in the future?

Options:

A.

DHCP snooping on trusted interfaces


B.

ARP inspection across VLANs


C.

Port security on all trunk ports


D.

Static DHCP reservations for clients


Expert Solution
Questions # 26:

A penetration tester completes a vulnerability scan showing multiple low-risk findings and one high-risk vulnerability tied to outdated server software. What should the tester prioritize as the next step?

Options:

A.

Perform a brute-force attack on the server to gain access


B.

Ignore the high-risk vulnerability and proceed with testing other systems


C.

Focus on exploiting the low-risk vulnerabilities first


D.

Verify if the high-risk vulnerability is exploitable by checking for known exploits


Expert Solution
Questions # 27:

As an IT technician in a small software development company, you are responsible for protecting the network against various cyber threats. You learn that attackers often try to bypass firewalls. Which of the following is a common technique used by attackers to evade firewall detection?

Options:

A.

Changing the source IP address of packets to make traffic appear to originate from a trusted source


B.

Using encrypted communication channels to evade network monitoring tools


C.

Using social engineering techniques to trick employees into revealing sensitive information


D.

Implementing an open-source operating system to bypass proprietary software restrictions


Expert Solution
Questions # 28:

A penetration tester is tasked with assessing the security of an Android mobile application that stores sensitive user data. The tester finds that the application does not use proper encryption to secure data at rest. What is the most effective way to exploit this vulnerability?

Options:

A.

Access the local storage to retrieve sensitive data directly from the device


B.

Use SQL injection to retrieve sensitive data from the backend server


C.

Execute a Cross-Site Scripting (XSS) attack to steal session cookies


D.

Perform a brute-force attack on the application ' s login credentials


Expert Solution
Questions # 29:

In downtown Chicago, Illinois, security analyst Mia Torres investigates a breach at Windy City Enterprises, a logistics firm running an Apache HTTP Server. The attacker exploited a known vulnerability in an outdated version, gaining unauthorized access to customer shipment data. Mia ' s analysis reveals the server lacked recent security updates, leaving it susceptible to remote code execution. Determined to prevent future incidents, Mia recommends a strategy to the IT team to address this exposure. Which approach should Mia recommend to secure Windy City Enterprises ' Apache HTTP Server against such vulnerabilities?

Options:

A.

Conduct an extensive risk assessment to determine which segments of the network are most vulnerable or at high risk that need to be patched first


B.

Use a dedicated machine as a web server


C.

Block all unnecessary ports, ICMP traffic, and unnecessary protocols such as NetBIOS and SMB


D.

Eliminate unnecessary files within the jar files


Expert Solution
Questions # 30:

In a bustling tech firm in Seattle, Michael, an ethical hacker, is conducting a security assessment to identify potential risks. During his evaluation, he notices that sensitive employee details and system configurations have been exposed through public forums, likely due to careless online behavior. His manager suspects this could lead to unauthorized access or data theft. As part of his testing, what type of threat should Michael focus on to simulate the adversary ' s method of gathering this exposed information?

Options:

A.

Corporate Espionage


B.

Social Engineering


C.

System and Network Attacks


D.

Information Leakage


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions