Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions
Questions # 46:

A penetration tester submits altered ciphertexts to a web server and pays close attention to how the server responds. When the server produces different error messages for certain inputs, the tester starts to infer which inputs result in valid internal processing. Which cryptanalytic method is being used in this scenario?

Options:

A.

Exploit padding error feedback to recover data


B.

Compare traffic timing to deduce the key


C.

Flip bits randomly to scramble the decryption


D.

Inspect randomness across multiple sessions


Expert Solution
Questions # 47:

You suspect a Man-in-the-Middle (MitM) attack inside the network. Which network activity would help confirm this?

Options:

A.

Sudden increase in traffic


B.

Multiple login attempts from one IP


C.

IP addresses resolving to multiple MAC addresses


D.

Abnormal DNS request volumes


Expert Solution
Questions # 48:

At Bayview University in San Francisco, California, ethical hacker Sofia Patel is evaluating security controls on Android 11 tablets used by staff. To simulate an attack, she installs KingoRoot.apk directly on one of the devices. The application leverages system vulnerabilities to elevate privileges without requiring a computer connection. Based on the module, which feature of this rooting approach makes the attack effective?

Options:

A.

It uses a tethered jailbreak to restart the device with patched kernel functions


B.

It is an APK that can run directly on the device without a PC


C.

It relies on weak SSL validation to bypass application controls


D.

It exploits Bluetooth pairing flaws to gain device-level privileges


Expert Solution
Questions # 49:

Systems are communicating with unknown external entities, raising concerns about exfiltration or malware. Which strategy most directly identifies and mitigates the risk?

Options:

A.

Aggressive zero-trust shutdown


B.

Deep forensic analysis


C.

Behavioral analytics profiling normal interactions


D.

Employee awareness training


Expert Solution
Questions # 50:

During a compliance review at a law firm in Chicago, an ethical hacker tests the firm’s secure email gateway. She observes that sensitive legal documents are being transmitted in clear text over the Internet, allowing anyone intercepting the traffic to read the contents. The firm is concerned about unauthorized individuals being able to view these communications. Which principle of information security is being violated?

Options:

A.

Confidentiality


B.

Integrity


C.

Non-Repudiation


D.

Availability


Expert Solution
Questions # 51:

A penetration tester evaluates a secure web application using HTTPS, secure cookies, and multi-factor authentication. To hijack a legitimate user’s session without triggering alerts, which technique should be used?

Options:

A.

Exploit a browser zero-day vulnerability to inject malicious scripts


B.

Implement a man-in-the-middle attack by compromising a trusted network device


C.

Perform a Cross-Site Request Forgery (CSRF) attack to manipulate session tokens


D.

Utilize a session token replay attack by capturing encrypted tokens


Expert Solution
Questions # 52:

A serverless application was compromised through an insecure third-party API used by a function. What is the most effective countermeasure?

Options:

A.

Deploy a cloud-native security platform


B.

Enforce function-level least privilege permissions


C.

Use a CASB for third-party services


D.

Regularly update serverless functions


Expert Solution
Questions # 53:

At Horizon Legal Services in Boston, Massachusetts, ethical hacker Daniel Price is tasked with assessing the security of the firm ' s mobile case-tracking app. During testing, he finds that confidential case notes and client records are kept locally on the device without encryption. By browsing the file system with a standard explorer tool, he can open sensitive information without any authentication. Which OWASP Top 10 Mobile Risk is most clearly present in the app?

Options:

A.

Insecure Communication


B.

Improper Credential Usage


C.

Insecure Data Storage


D.

Inadequate Privacy Controls


Expert Solution
Questions # 54:

An ethical hacker conducts testing with full knowledge and permission. What type of hacking is this?

Options:

A.

Blue Hat


B.

Grey Hat


C.

White Hat


D.

Black Hat


Expert Solution
Questions # 55:

A penetration tester must enumerate user accounts and network resources in a highly secured Windows environment where SMB null sessions are blocked. Which technique should be used to gather this information discreetly?

Options:

A.

Utilize NetBIOS over TCP/IP to list shared resources anonymously


B.

Exploit a misconfigured LDAP service to perform anonymous searches


C.

Leverage Active Directory Web Services for unauthorized queries


D.

Conduct a zone transfer by querying the organization’s DNS servers


Expert Solution
Questions # 56:

During an internal red team engagement at a financial services firm, an ethical hacker named Anika tests persistence mechanisms after successfully gaining access to a junior employee’s workstation. As part of her assessment, she deploys a lightweight binary into a low-visibility system folder. To maintain long-term access, she configures it to launch automatically on every system reboot without requiring user interaction.

Which of the following techniques has most likely been used to ensure the persistence of the attacker’s payload?

Options:

A.

Installing a keylogger


B.

Creating scheduled tasks


C.

Modifying file attributes


D.

Injecting into the startup folder


Expert Solution
Questions # 57:

During a review for DoS threats, several IP addresses generate excessive traffic. Packet inspection shows the TCP three-way handshake is never completed, leaving many connections in a SYN_RECEIVED state and consuming server resources without completing sessions. What type of DoS attack is most likely occurring?

Options:

A.

SYN Flood


B.

Ping of Death


C.

UDP Flood


D.

Smurf Attack


Expert Solution
Questions # 58:

A penetration tester is running a vulnerability scan on a company’s network. The scan identifies an open port with a high-severity vulnerability linked to outdated software. What is the most appropriate next step for the tester?

Options:

A.

Execute a denial-of-service (DoS) attack on the open port


B.

Perform a brute-force attack on the service running on the open port


C.

Research the vulnerability and determine if it has a publicly available exploit


D.

Ignore the vulnerability and focus on finding more vulnerabilities


Expert Solution
Questions # 59:

Joe, a cybersecurity analyst at Norwest Freight Services, has been assigned to run a vulnerability scan across the organization ' s infrastructure. He is specifically tasked with detecting weaknesses such as missing patches, unnecessary services, weak encryption, and authentication flaws across multiple servers. His scan identifies open ports and active services throughout the environment, providing a clear map of potential entry points for attackers.

Which type of vulnerability scanning best matches Joe ' s assignment?

Options:

A.

Network-based Scanning


B.

External Scanning


C.

Application Scanning


D.

Host-based Scanning


Expert Solution
Questions # 60:

An attacker extracts the initial bytes from an encrypted file container and uses a tool to iterate through numeric combinations. What type of cryptanalytic technique is being utilized?

Options:

A.

Seek identical digests across hash outputs


B.

Test every possible password through automation


C.

Force encryption key through quantum solving


D.

Analyze output length to spot anomalies


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions