Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions
Questions # 31:

During an external assessment of a healthcare insurance company in Houston, a penetration tester identifies a service running on TCP port 389. When queried, the service accepts anonymous binds and reveals directory data. By structuring his search filter, the tester is able to obtain usernames, departmental details, and organizational units. This information could potentially be used for targeted password attacks or privilege escalation.

Which classification best describes this enumeration activity?

Options:

A.

SMTP Enumeration


B.

DNS Enumeration


C.

LDAP Enumeration


D.

NTP Enumeration


Expert Solution
Questions # 32:

Which method best bypasses client-side controls without triggering server-side alarms?

Options:

A.

Disable JavaScript in the browser


B.

Intercept and modify requests using a proxy tool


C.

Inject malicious JavaScript into the login form


D.

Reverse-engineer the encryption algorithm


Expert Solution
Questions # 33:

A security analyst investigates unusual east-west traffic on a corporate network. A rogue device has been physically inserted between a workstation and the switch, enabling unauthorized access while inheriting the workstation’s authenticated network state. Which evasion technique is being used?

Options:

A.

Exploiting a wireless rogue access point to tunnel through the firewall


B.

NAC bypass using a pre-authenticated device for network bridging


C.

Spoofing ARP responses from a dynamic IP allocation pool


D.

VLAN double tagging to shift between network segments


Expert Solution
Questions # 34:

Sarah, an ethical hacker at a San Francisco-based financial firm, is testing the security of their customer database after a recent data exposure incident. Her analysis reveals that the sensitive client information is safeguarded using a symmetric encryption algorithm. She observes that the algorithm processes data in 64-bit blocks and supports a variable key size from 32 to 448 bits. During her penetration test, Sarah intercepts a ciphertext transmission and notes that the encryption was developed as a replacement for DES, an older algorithm. She aims to determine if the algorithm’s flexible key size could be susceptible to brute-force attacks. The algorithm is also noted for its use in secure storage, a critical application for the firm’s data protection.

Which symmetric encryption algorithm should Sarah identify as the one used by the firm?

Options:

A.

RC4


B.

Twofish


C.

AES


D.

Blowfish


Expert Solution
Questions # 35:

During an IDS audit, you notice numerous alerts triggered by legitimate user activity. What is the most likely cause?

Options:

A.

Regular users are unintentionally triggering security protocols


B.

The firewall is failing to block malicious traffic


C.

The IDS is outdated and unpatched


D.

The IDS is configured with overly sensitive thresholds


Expert Solution
Questions # 36:

As a Certified Ethical Hacker assessing session management vulnerabilities in a secure web application using MFA, encrypted cookies, and a WAF, which technique would most effectively exploit a session management weakness while bypassing these defenses?

Options:

A.

Utilizing Session Fixation to force a victim to use a known session ID


B.

Executing a Cross-Site Request Forgery (CSRF) attack


C.

Exploiting insecure deserialization vulnerabilities for code execution


D.

Conducting Session Sidejacking using captured session tokens


Expert Solution
Questions # 37:

You perform a FIN scan and observe that many ports do not respond to FIN packets. How should these results be interpreted?

Options:

A.

Conclude the ports are closed


B.

Escalate as an active breach


C.

Attribute it to network congestion


D.

Suspect firewall filtering and investigate further


Expert Solution
Questions # 38:

During a red team exercise at a technology consulting firm in San Francisco, analyst Evelyn deploys a malicious payload disguised within a software update installer. When the target runs the installer, the main application functions normally, but behind the scenes, additional malware components are silently placed on the system without the user ' s knowledge. These hidden components later activate to establish remote access for the red team.

Which technique was most likely used to deliver the hidden malware?

Options:

A.

Downloader


B.

Wrapper


C.

Injector


D.

Dropper


Expert Solution
Questions # 39:

A penetration tester detects malware on a system that secretly records all keystrokes entered by the user. What type of malware is this?

Options:

A.

Rootkit


B.

Ransomware


C.

Keylogger


D.

Worm


Expert Solution
Questions # 40:

A system analyst wants to implement an encryption solution that allows secure key distribution between communicating parties. Which encryption method should the analyst consider?

Options:

A.

Disk encryption


B.

Symmetric encryption


C.

Hash functions


D.

Asymmetric encryption


Expert Solution
Questions # 41:

An organization uses SHA-256 for data integrity verification but still experiences unauthorized data modification. Which cryptographic tool would best resolve this issue?

Options:

A.

Asymmetric encryption


B.

Symmetric encryption


C.

SSL/TLS certificates


D.

Digital signatures


Expert Solution
Questions # 42:

You are an ethical hacker at SecureNet Solutions, conducting a penetration test for BlueRidge Manufacturing in Denver, Colorado. While auditing their wireless network, you observe that the access point uses a security protocol that employs the RC4 algorithm with a 24-bit initialization vector IV to encrypt data between network clients. Based on the observed encryption characteristics, which wireless encryption protocol is the access point using?

Options:

A.

WPA


B.

WPA2


C.

WEP


D.

WPA3


Expert Solution
Questions # 43:

A financial institution ' s online banking platform is experiencing intermittent downtime caused by a sophisticated DDoS attack that combines SYN floods and HTTP GET floods from a distributed botnet. Standard firewalls and load balancers cannot mitigate the attack without affecting legitimate users. To protect their infrastructure and maintain service availability, which advanced mitigation strategy should the institution implement?

Options:

A.

Configure firewalls to block all incoming SYN and HTTP requests from external IPs


B.

Increase server bandwidth and apply basic rate limiting on incoming traffic


C.

Deploy an Intrusion Prevention System (IPS) with deep packet inspection capabilities


D.

Utilize a cloud-based DDoS protection service that offers multi-layer traffic scrubbing and auto-scaling


Expert Solution
Questions # 44:

An attacker performs DNS cache snooping using the dig command with the +norecurse flag against a known DNS server. The server returns NOERROR but provides no answer to the query. What does this most likely suggest?

Options:

A.

The record was found in the DNS cache and successfully returned.


B.

The DNS server failed to resolve the request.


C.

No client from the DNS server’s network has recently accessed the queried domain.


D.

The queried domain has expired and no longer exists.


Expert Solution
Questions # 45:

During a security penetration test at ABC Financial Services in Miami, Florida, on July 9, 2025, ethical hacker Javier Morales targets the company’s online banking portal to assess its resilience. Over several hours, the portal’s web server begins to falter, with legitimate users reporting inability to log in or complete transactions. The IT team notices the server is struggling to accept new connections, as its maximum connection limit is nearly reached, despite no significant spike in overall network traffic. Javier’s controlled test, run from a secure system, logs interactions to simulate a real attack, aiming to evaluate the IT team’s ability to identify the threat.

What DoS or DDoS attack technique is Javier’s exercise primarily simulating?

Options:

A.

Slowloris Attack


B.

UDP Flood Attack


C.

Peer-to-Peer Attack


D.

SYN Flood Attack


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions