New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 4 out of 14 pages
Viewing questions 46-60 out of questions
Questions # 46:

Study the following log extract and identify the attack.

[Image shows an HTTP GET request with encoded traversal strings, such as

Question # 46

Options:

A.

Hexcode Attack


B.

Cross Site Scripting


C.

Multiple Domain Traversal Attack


D.

Unicode Directory Traversal Attack


Expert Solution
Questions # 47:

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Joel in the above scenario?

Options:

A.

DNS rebinding attack


B.

Clickjacking attack


C.

MarioNet attack


D.

Watering hole attack


Expert Solution
Questions # 48:

Scenario1:

1.Victim opens the attacker's web site.

2.Attacker sets up a web site which contains interesting and attractive content like 'Do you want to make

$1000 in a day?'.

3.Victim clicks to the interesting and attractive content URL.

4.Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the 'Do you want to make $1000 in a day?' URL but actually he/she clicks to the content or URL that exists in the transparent 'iframe' which is setup by the attacker.

What is the name of the attack which is mentioned in the scenario?

Options:

A.

Session Fixation


B.

HTML Injection


C.

HTTP Parameter Pollution


D.

Clickjacking Attack


Expert Solution
Questions # 49:

What would you enter if you wanted to perform a stealth scan using Nmap?

Options:

A.

nmap -sM


B.

nmap -sU


C.

nmap -sS


D.

nmap -sT


Expert Solution
Questions # 50:

Study the Snort rule given below:

[Image shows two Snort rules with alert messages for NETBIOS DCERPC ISystemActivator bind attempt, targeting TCP ports 135 and 445. References include CVE: CAN-2003-0352.]

Question # 50

Options:

A.

WebDav


B.

SQL Slammer


C.

MS Blaster


D.

MyDoom


Expert Solution
Questions # 51:

A penetration tester performs a vulnerability scan on a company’s web server and identifies several medium-risk vulnerabilities related to misconfigured settings. What should the tester do to verify the vulnerabilities?

Options:

A.

Use publicly available tools to exploit the vulnerabilities and confirm their impact


B.

Ignore the vulnerabilities since they are medium-risk


C.

Perform a brute-force attack on the web server's login page


D.

Conduct a denial-of-service (DoS) attack to test the server's resilience


Expert Solution
Questions # 52:

In the process of footprinting a target website, an ethical hacker utilized various tools to gather critical information. The hacker encountered a target site where standard web spiders were ineffective due to a specific file in its root directory. However, they managed to uncover all the files and web pages on the target site, monitoring the resulting incoming and outgoing traffic while browsing the website manually. What technique did the hacker likely employ to achieve this?

Options:

A.

Using Photon to retrieve archived URLs of the target website from archive.org


B.

Using the Netcraft tool to gather website information


C.

Examining HTML source code and cookies


D.

User-directed spidering with tools like Burp Suite and WebScarab


Expert Solution
Questions # 53:

Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc.) for a Domain.

What do you think Tess King is trying to accomplish? Select the best answer.

Options:

A.

A zone harvesting


B.

A zone transfer


C.

A zone update


D.

A zone estimate


Expert Solution
Questions # 54:

in an attempt to increase the security of your network, you Implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know It. How do you accomplish this?

Options:

A.

Delete the wireless network


B.

Remove all passwords


C.

Lock all users


D.

Disable SSID broadcasting


Expert Solution
Questions # 55:

John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the IoT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of IoT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John in the above scenario?

Options:

A.

IoTSeeker


B.

IoT Inspector


C.

AT&T IoT Platform


D.

Azure IoT Central


Expert Solution
Questions # 56:

An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security testing and to guard the organization's web infrastructure against web-application threats. Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks. Which of the following security scanners will help John perform the above task?

Options:

A.

AlienVault®OSSIM™


B.

Syhunt Hybrid


C.

Saleae Logic Analyzer


D.

Cisco ASA


Expert Solution
Questions # 57:

Which of the following statements is FALSE with respect to Intrusion Detection Systems?

Options:

A.

Intrusion Detection Systems can be configured to distinguish specific content in network packets


B.

Intrusion Detection Systems can easily distinguish a malicious payload in encrypted traffic


C.

Intrusion Detection Systems require constant update of the signature library


D.

Intrusion Detection Systems can examine the contents of the data in context of the network protocol


Expert Solution
Questions # 58:

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

Options:

A.

Network Sniffer


B.

Vulnerability Scanner


C.

Intrusion Prevention Server


D.

Security Information and Event Monitoring (SIEM)


Expert Solution
Questions # 59:

David is a security professional working in an organization, and he is implementing a vulnerability management program in the organization to evaluate and control the risks and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable systems to reduce the impact and severity of vulnerabilities. Which phase of the vulnerability-management life cycle is David currently in?

Options:

A.

verification


B.

Risk assessment


C.

Vulnerability scan


D.

Remediation


Expert Solution
Questions # 60:

During a black-box internal penetration test, a security analyst identifies an SNMPv2-enabled Linux server using the default community string “public.” The analyst wants to enumerate running processes. Which Nmap command retrieves this information?

Options:

A.

nmap -sU -p 161 --script snmp-sysdescr


B.

nmap -sU -p 161 --script snmp-win32-services


C.

nmap -sU -p 161 --script snmp-processes


D.

nmap -sU -p 161 --script snmp-interfaces


Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 46-60 out of questions