Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 41-60 out of questions
Questions # 41:

How can rainbow tables be defeated?

Options:

A.

Use of non-dictionary words


B.

All uppercase character passwords


C.

Password salting


D.

Lockout accounts under brute force password cracking attempts


Expert Solution
Questions # 42:

John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the IoT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of IoT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John in the above scenario?

Options:

A.

IoTSeeker


B.

IoT Inspector


C.

AT&T IoT Platform


D.

Azure IoT Central


Expert Solution
Questions # 43:

Which approach should an ethical hacker avoid to maintain passive reconnaissance?

Options:

A.

Direct interaction with the threat actor


B.

WHOIS and DNS lookups


C.

Anonymous browsing via Tor


D.

Using the Wayback Machine


Expert Solution
Questions # 44:

You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether someone is performing an ARP spoofing attack on your laptop?

Options:

A.

You should check your ARP table and see if there is one IP address with two different MAC addresses.


B.

You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates.


C.

You should use netstat to check for any suspicious connections with another IP address within the LAN.


D.

You cannot identify such an attack and must use a VPN to protect your traffic, r


Expert Solution
Questions # 45:

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

Options:

A.

msfpayload


B.

msfcli


C.

msfd


D.

msfencode


Expert Solution
Questions # 46:

To hide the file on a Linux system, you have to start the filename with a specific character. What is the character?

Options:

A.

Exclamation mark (!)


B.

Underscore (_)


C.

Tilde (~)


D.

Period (.)


Expert Solution
Questions # 47:

In the context of Windows Security, what is a 'null' user?

Options:

A.

A user that has no skills


B.

An account that has been suspended by the admin


C.

A pseudo account that has no username and password


D.

A pseudo account that was created for security administration purpose


Expert Solution
Questions # 48:

Sam, a web developer, was instructed to incorporate a hybrid encryption software program into a web application to secure email messages. Sam used an encryption software, which is a free implementation of the OpenPGP standard that uses both symmetric-key cryptography and asymmetric-key cryptography for improved speed and secure key exchange. What is the encryption software employed by Sam for securing the email messages?

Options:

A.

PGP


B.

S/MIME


C.

SMTP


D.

GPG


Expert Solution
Questions # 49:

After a breach, investigators discover attackers used modified legitimate system utilities and a Windows service to persist undetected and harvest credentials. What key step would best protect against similar future attacks?

Options:

A.

Disable unused ports and restrict outbound firewall traffic


B.

Perform weekly backups and store them off-site


C.

Ensure antivirus and firewall software are up to date


D.

Monitor file hashes of critical executables for unauthorized changes


Expert Solution
Questions # 50:

Which results will be returned with the following Google search query?

site:target.com –site:Marketing.target.com accounting

Options:

A.

Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.


B.

Results matching all words in the query.


C.

Results for matches on target.com and Marketing.target.com that include the word “accounting”


D.

Results matching “accounting” in domain target.com but not on the site Marketing.target.com


Expert Solution
Questions # 51:

A penetration tester is hired to legally assess the security of a company's network by identifying vulnerabilities and attempting to exploit them. What type of hacker is this?

Options:

A.

Black Hat


B.

Grey Hat


C.

Script Kiddie


D.

White Hat


Expert Solution
Questions # 52:

A system analyst wants to implement an encryption solution that allows secure key distribution between communicating parties. Which encryption method should the analyst consider?

Options:

A.

Disk encryption


B.

Symmetric encryption


C.

Hash functions


D.

Asymmetric encryption


Expert Solution
Questions # 53:

Jake, a network security specialist, is trying to prevent network-level session hijacking attacks in his company.

While studying different types of such attacks, he learns about a technique where an attacker inserts their machine into the communication between a client and a server, making it seem like the packets are flowing through the original path. This technique is primarily used to reroute the packets. Which of the following types of network-level session hijacking attacks is Jake studying?

Options:

A.

RST Hijacking


B.

Man-in-the-middle Attack Using Forged ICMP and ARP Spoofing


C.

UDP Hijacking


D.

TCP/IP Hijacking


Expert Solution
Questions # 54:

Which of the following is the BEST way to defend against network sniffing?

Options:

A.

Using encryption protocols to secure network communications


B.

Register all machines MAC Address in a Centralized Database


C.

Use Static IP Address


D.

Restrict Physical Access to Server Rooms hosting Critical Servers


Expert Solution
Questions # 55:

You are an ethical hacker tasked with conducting an enumeration of a company’s network. Given a Windows system with NetBIOS enabled, port 139 open, and file and printer sharing active, you are about to run some nbtstat commands to enumerate NetBIOS names. The company uses |Pv6 for its network. Which of the

following actions should you take next?

Options:

A.

Use nbtstat -c to get the contents of the NetBIOS name cache


B.

use nbtstat -a followed by the IPv6 address of the target machine


C.

Utilize Nmap Scripting Engine (NSE) for NetBIOS enumeration


D.

Switch to an enumeration tool that supports IPv6


Expert Solution
Questions # 56:

As an IT Security Analyst, you’ve been asked to review the security measures of an e-commerce website that relies on a SQL database for storing sensitive customer data. Recently, an anonymous tip has alerted you to a possible threat: a seasoned hacker who specializes in SQL Injection attacks may be targeting your system. The site already employs input validation measures to prevent basic injection attacks, and it blocks any user inputs containing suspicious patterns. However, this hacker is known to use advanced SQL Injection techniques. Given this situation, which of the following strategies would the hacker most likely adopt to bypass your security measures?

Options:

A.

The hacker could deploy an 'out-of-band' SQL Injection attack, extracting data via a different communication channel, such as DNS or HTTP requests


B.

The hacker may resort to a DDoS attack instead, attempting to crash the server and thus render the e commerce site unavailable


C.

The hacker may try to use SQL commands which are less known and less likely to be blocked by your system's security


D.

The hacker might employ a blind' SQL Injection attack, taking advantage of the application's true or false responses to extract data bit by bit


Expert Solution
Questions # 57:

A penetration tester is tasked with gathering information about the subdomains of a target organization's website. The tester needs a versatile and efficient solution for the task. Which of the following options would be the most effective method to accomplish this goal?

Options:

A.

Employing a tool like Sublist3r, which is designed to enumerate the subdomains of websites using OSINT


B.

Analyzing Linkedin profiles to find employees of the target company and their job titles


C.

Utilizing the Harvester tool to extract email addresses related to the target domain using a search engine like Google or Bing


D.

Using a people search service, such as Spokeo or Intelius, to gather information about the employees of the target organization


Expert Solution
Questions # 58:

At what stage of the cyber kill chain theory model does data exfiltration occur?

Options:

A.

Actions on objectives


B.

Weaponization


C.

installation


D.

Command and control


Expert Solution
Questions # 59:

An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.

What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

Options:

A.

Side-channel attack


B.

Denial-of-service attack


C.

HMI-based attack


D.

Buffer overflow attack


Expert Solution
Questions # 60:

An attacker places a malicious VM on the same physical server as a target VM in a multi-tenant cloud environment. The attacker then extracts cryptographic keys using CPU timing analysis. What type of attack was conducted?

Options:

A.

Side-channel attack


B.

Cloud cryptojacking


C.

Cache poisoned denial of service (CPDoS)


D.

Metadata spoofing


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 41-60 out of questions