New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 31-45 out of questions
Questions # 31:

A well-resourced attacker intends to launch a highly disruptive DDoS attack against a major online retailer. The attacker aims to exhaust all the network resources while keeping their identity concealed. Their method should be resistant to simple defensive measures such as IP-based blocking. Based on these objectives, which of the following attack strategies would be most effective?

Options:

A.

The attacker should instigate a protocol-based SYN flood attack, consuming connection state tables on the retailer's servers


B.

The attacker should execute a simple ICMP flood attack from a single IP, exploiting the retailer's ICMP processing


C.

The attacker should leverage a botnet to launch a Pulse Wave attack, sending high-volume traffic pulses at regular intervals


D.

The attacker should initiate a volumetric flood attack using a single compromised machine to overwhelm the retailer's network bandwidth


Expert Solution
Questions # 32:

During testing against a network protected by a signature-based IDS, the tester notices that standard scans are blocked. To evade detection, the tester sends TCP headers split into multiple small IP fragments so the IDS cannot reassemble or interpret them, but the destination host can. What technique is being used?

Options:

A.

IP decoying with randomized address positions


B.

SYN scan with spoofed MAC address


C.

Packet crafting with randomized window size


D.

Packet fragmentation to bypass filtering logic


Expert Solution
Questions # 33:

Which tool can be used to silently copy files from USB devices?

Options:

A.

USB Grabber


B.

USB Snoopy


C.

USB Sniffer


D.

USB Dumper


Expert Solution
Questions # 34:

A university's online registration system is disrupted by a combined DNS reflection and HTTP Slowloris DDoS attack. Standard firewalls cannot mitigate the attack without blocking legitimate users. What is the best mitigation strategy?

Options:

A.

Increase server bandwidth and implement basic rate limiting


B.

Deploy an Intrusion Prevention System (IPS) with deep packet inspection


C.

Configure the firewall to block all incoming DNS and HTTP requests


D.

Utilize a hybrid DDoS mitigation service that offers both on-premises and cloud-based protection


Expert Solution
Questions # 35:

Samuel, a professional hacker, monitored and Intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with <| packet having an Incremented ISN. Consequently. Bob's connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob. What is the type of attack performed by Samuel in the above scenario?

Options:

A.

UDP hijacking


B.

Blind hijacking


C.

TCP/IP hacking


D.

Forbidden attack


Expert Solution
Questions # 36:

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.

What is the most likely cause?

Options:

A.

The network devices are not all synchronized.


B.

Proper chain of custody was not observed while collecting the logs.


C.

The attacker altered or erased events from the logs.


D.

The security breach was a false positive.


Expert Solution
Questions # 37:

A penetration tester is attacking a wireless network running WPA3 encryption. Since WPA3 handshake protections prevent offline brute-force cracking, what is the most effective approach?

Options:

A.

Downgrade the connection to WPA2 and capture the handshake to crack the key


B.

Execute a dictionary attack on the WPA3 handshake using common passwords


C.

Perform a brute-force attack directly on the WPA3 handshake


D.

Perform a SQL injection attack on the router's login page


Expert Solution
Questions # 38:

Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?

Options:

A.

Alice's private key


B.

Alice's public key


C.

His own private key


D.

His own public key


Expert Solution
Questions # 39:

Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about ONS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names. IP addresses. DNS records, and network Who is records. He further exploited this information to launch other sophisticated attacks. What is the tool employed by Gerard in the above scenario?

Options:

A.

Knative


B.

zANTI


C.

Towelroot


D.

Bluto


Expert Solution
Questions # 40:

An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim's data. What type of attack is this?

Options:

A.

Phishing


B.

Vlishing


C.

Spoofing


D.

DDoS


Expert Solution
Questions # 41:

You are attempting to crack LM Manager hashes from a Windows 2000 SAM file. You will be using an LM brute-force hacking tool for decryption.

What encryption algorithm will you be decrypting?

Options:

A.

MD4


B.

DES


C.

SHA


D.

SSL


Expert Solution
Questions # 42:

The network users are complaining because their system are slowing down. Further, every time they attempt to go a website, they receive a series of pop-ups with advertisements. What types of malware have the system been infected with?

Options:

A.

Virus


B.

Spyware


C.

Trojan


D.

Adware


Expert Solution
Questions # 43:

A penetration tester submits altered ciphertexts to a web server and pays close attention to how the server responds. When the server produces different error messages for certain inputs, the tester starts to infer which inputs result in valid internal processing. Which cryptanalytic method is being used in this scenario?

Options:

A.

Exploit padding error feedback to recover data


B.

Compare traffic timing to deduce the key


C.

Flip bits randomly to scramble the decryption


D.

Inspect randomness across multiple sessions


Expert Solution
Questions # 44:

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

Options:

A.

A biometric system that bases authentication decisions on behavioral attributes.


B.

A biometric system that bases authentication decisions on physical attributes.


C.

An authentication system that creates one-time passwords that are encrypted with secret keys.


D.

An authentication system that uses passphrases that are converted into virtual passwords.


Expert Solution
Questions # 45:

You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether someone is performing an ARP spoofing attack on your laptop?

Options:

A.

You should check your ARP table and see if there is one IP address with two different MAC addresses.


B.

You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates.


C.

You should use netstat to check for any suspicious connections with another IP address within the LAN.


D.

You cannot identify such an attack and must use a VPN to protect your traffic, r


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 31-45 out of questions