Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 4 out of 14 pages
Viewing questions 61-80 out of questions
Questions # 61:

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems, and intrusion detection/prevention tools in your company's network. You are confident that hackers will never be able to gain access. Your peer, Peter Smith, disagrees and says the presence of a “weakest link” still exposes the network.

What is Peter Smith talking about?

Options:

A.

Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain


B.

"Zero-day" exploits are the weakest link in the security chain since IDS will not be able to detect these attacks


C.

"Polymorphic viruses" are the weakest link in the security chain since antivirus scanners will not be able to detect these attacks


D.

Continuous spam emails cannot be blocked by your security system since spammers use different techniques to bypass filters


Expert Solution
Questions # 62:

Repeated failed login attempts are followed by a sudden surge in outbound data traffic from a critical server. What should be your initial course of action?

Options:

A.

Audit all outbound traffic and analyze destination IPs


B.

Immediately disconnect the server from the network


C.

Perform real-time monitoring and log analysis to understand the activity


D.

Change server credentials and force password resets


Expert Solution
Questions # 63:

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

Options:

A.

Social engineering


B.

Piggybacking


C.

Tailgating


D.

Eavesdropping


Expert Solution
Questions # 64:

A penetration tester discovers that a system is infected with malware that encrypts all files and demands payment for decryption. What type of malware is this?

Options:

A.

Worm


B.

Spyware


C.

Keylogger


D.

Ransomware


Expert Solution
Questions # 65:

An ethical hacker has been tasked with assessing the security of a major corporation's network. She suspects the network uses default SNMP community strings. To exploit this, she plans to extract valuable network information using SNMP enumeration. Which tool could best help her to get the information without directly modifying any parameters within the SNMP agent’s management information base (MIB)?

Options:

A.

snmp-check (snmp_enum Module) to gather a wide array of information about the target


B.

Nmap, with a script to retrieve all running SNMP processes and associated ports


C.

Oputits, are mainly designed for device management and not SNMP enumeration


D.

SnmpWalk, with a command to change an OID to a different value


Expert Solution
Questions # 66:

Mary found a high vulnerability during a vulnerability scan and notified her server team. After analysis, they sent her proof that a fix to that issue had already been applied. The vulnerability that Marry found is called what?

Options:

A.

False-negative


B.

False-positive


C.

Brute force attack


D.

Backdoor


Expert Solution
Questions # 67:

Abnormal DNS resolution behavior is detected on an internal network. Users are redirected to altered login pages. DNS replies come from an unauthorized internal IP and are faster than legitimate responses. ARP spoofing alerts are also detected. What sniffing-based attack is most likely occurring?

Options:

A.

Internet DNS spoofing


B.

Intranet DNS poisoning via local spoofed responses


C.

Proxy-based DNS redirection


D.

Upstream DNS cache poisoning


Expert Solution
Questions # 68:

A company’s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.

What kind of Web application vulnerability likely exists in their software?

Options:

A.

Cross-site scripting vulnerability


B.

SQL injection vulnerability


C.

Web site defacement vulnerability


D.

Gross-site Request Forgery vulnerability


Expert Solution
Questions # 69:

A web server was compromised through DNS hijacking. What would most effectively prevent this in the future?

Options:

A.

Changing IP addresses


B.

Regular patching


C.

Implementing DNSSEC


D.

Using LAMP architecture


Expert Solution
Questions # 70:

What is a “Collision attack” in cryptography?

Options:

A.

Collision attacks try to get the public key


B.

Collision attacks try to break the hash into three parts to get the plaintext value


C.

Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key


D.

Collision attacks try to find two inputs producing the same hash


Expert Solution
Questions # 71:

An attacker is analyzing traffic from a mobile app and finds that sensitive data like session tokens are being transmitted over HTTP instead of HTTPS. The attacker plans to intercept and manipulate the data during transmission. Which vulnerability is the attacker exploiting?

Options:

A.

Security Misconfiguration


B.

Improper SSL Pinning


C.

Insecure Communication


D.

Insufficient Input Validation


Expert Solution
Questions # 72:

Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in the application she is working on. She utilizes a component that can process API requests and handle various Docker objects, such as containers, volumes. Images, and networks. What is the component of the Docker architecture used by Annie in the above scenario?

Options:

A.

Docker client


B.

Docker objects


C.

Docker daemon


D.

Docker registries


Expert Solution
Questions # 73:

During a security assessment of a cloud-hosted application using SOAP-based web services, a red team operator intercepts a valid SOAP request, duplicates the signed message body, inserts it into the same envelope, and forwards it. Due to improper validation, the server accepts the duplicated body and executes unauthorized code. What type of attack does this represent?

Options:

A.

Cloud snooper attack


B.

Cryptanalysis attack


C.

Wrapping attack


D.

IMDS abuse


Expert Solution
Questions # 74:

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

Options:

A.

hping2 host.domain.com


B.

hping2 --set-ICMP host.domain.com


C.

hping2 -i host.domain.com


D.

hping2 -1 host.domain.com


Expert Solution
Questions # 75:

What is a NULL scan?

Options:

A.

A scan in which all flags are turned off


B.

A scan in which certain flags are off


C.

A scan in which all flags are on


D.

A scan in which the packet size is set to zero


E.

A scan with an illegal packet size


Expert Solution
Questions # 76:

Mirai malware targets IoT devices. After infiltration, it uses them to propagate and create botnets that are then used to launch which types of attack?

Options:

A.

MITM attack


B.

Birthday attack


C.

DDoS attack


D.

Password attack


Expert Solution
Questions # 77:

James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an open-source framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources.

What is the framework used by James to conduct footprinting and reconnaissance activities?

Options:

A.

WebSploit Framework


B.

Browser Exploitation Framework


C.

OSINT framework


D.

SpeedPhish Framework


Expert Solution
Questions # 78:

Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?

Options:

A.

WPA3-Personal


B.

WPA2-Enterprise


C.

Bluetooth


D.

ZigBee


Expert Solution
Questions # 79:

A penetration tester is testing a web application's product search feature, which takes user input and queries the database. The tester suspects inadequate input sanitization. What is the best approach to confirm the presence of SQL injection?

Options:

A.

Inject a script to test for Cross-Site Scripting (XSS)


B.

Input DROP TABLE products; -- to see if the table is deleted


C.

Enter 1' OR '1'='1 to check if all products are returned


D.

Use directory traversal syntax to access restricted files on the server


Expert Solution
Questions # 80:

A large company intends to use BlackBerry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?

Options:

A.

Paros Proxy


B.

BBProxy


C.

Blooover


D.

BBCrack


Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 61-80 out of questions