New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 61-75 out of questions
Questions # 61:

You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. Passwords must be at least 8 characters and use 3 of the 4 categories (lowercase, uppercase, numbers, special characters). With your knowledge of likely user habits, what would be the fastest type of password cracking attack to run against these hash values?

Options:

A.

Online Attack


B.

Dictionary Attack


C.

Brute Force Attack


D.

Hybrid Attack


Expert Solution
Questions # 62:

In a large organization, a network security analyst discovered a series of packet captures that seem unusual.

The network operates on a switched Ethernet environment. The security team suspects that an attacker might

be using a sniffer tool. Which technique could the attacker be using to successfully carry out this attack,

considering the switched nature of the network?

Options:

A.

The attacker might be compromising physical security to plug into the network directly


B.

The attacker might be implementing MAC flooding to overwhelm the switch's memory


C.

The attacker is probably using a Trojan horse with in-built sniffing capability


D.

The attacker might be using passive sniffing, as it provides significant stealth advantages


Expert Solution
Questions # 63:

Which method of password cracking takes the most time and effort?

Options:

A.

Dictionary attack


B.

Shoulder surfing


C.

Rainbow tables


D.

Brute force


Expert Solution
Questions # 64:

A penetration tester is tasked with identifying vulnerabilities on a web server running outdated software. The server hosts several web applications and is protected by a basic firewall. Which technique should the tester use to exploit potential server vulnerabilities?

Options:

A.

Conduct a SQL injection attack on the web application's login form


B.

Perform a brute-force login attack on the admin panel


C.

Execute a buffer overflow attack targeting the web server software


D.

Use directory traversal to access sensitive configuration files


Expert Solution
Questions # 65:

What is the most common method to exploit the “Bash Bug” or “Shellshock” vulnerability?

Options:

A.

SYN Flood


B.

SSH


C.

Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server


D.

Manipulate format strings in text fields


Expert Solution
Questions # 66:

What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?

Options:

A.

Performing content enumeration on the web server to discover hidden folders


B.

Using wget to perform banner grabbing on the web server


C.

Flooding the web server with requests to perform a DoS attack


D.

Downloading all the contents of the web page locally for further examination


Expert Solution
Questions # 67:

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stacheldraht have in common?

Options:

A.

All are hacking tools developed by the Legion of Doom


B.

All are tools that can be used not only by hackers, but also security personnel


C.

All are DDOS tools


D.

All are tools that are only effective against Windows


E.

All are tools that are only effective against Linux


Expert Solution
Questions # 68:

A penetration tester is evaluating a web application that does not properly validate the authenticity of HTTP requests. The tester suspects the application is vulnerable to Cross-Site Request Forgery (CSRF). Which approach should the tester use to exploit this vulnerability?

Options:

A.

Execute a directory traversal attack to access restricted server files


B.

Create a malicious website that sends a crafted request on behalf of the user when visited


C.

Perform a brute-force attack on the application’s login page to guess weak credentials


D.

Inject a SQL query into the input fields to perform SQL injection


Expert Solution
Questions # 69:

While evaluating a smart card implementation, a security analyst observes that an attacker is measuring fluctuations in power consumption and timing variations during encryption operations on the chip. The attacker uses this information to infer secret keys used within the device. What type of exploitation is being carried out?

Options:

A.

Disrupt control flow to modify instructions


B.

Observe hardware signals to deduce secrets


C.

Crack hashes using statistical collisions


D.

Force session resets through input flooding


Expert Solution
Questions # 70:

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages. What is the attack performed in the above scenario?

Options:

A.

Timing-based attack


B.

Side-channel attack


C.

Downgrade security attack


D.

Cache-based attack


Expert Solution
Questions # 71:

Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now, Clark gains access to Steven’s iPhone through the infected computer and is able to monitor and read all of Steven’s activity on the iPhone, even after the device is out of the communication zone.

Which of the following attacks is performed by Clark in above scenario?

Options:

A.

IOS trustjacking


B.

lOS Jailbreaking


C.

Exploiting SS7 vulnerability


D.

Man-in-the-disk attack


Expert Solution
Questions # 72:

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet 10.1.4.0/23. Which of the following IP addresses could be leased as a result of the new configuration?

Options:

A.

210.1.55.200


B.

10.1.4.254


C.

10.1.5.200


D.

10.1.4.156


Expert Solution
Questions # 73:

An ethical hacker needs to gather detailed information about a company's internal network without initiating any direct interaction that could be logged or raise suspicion. Which approach should be used to obtain this information covertly?

Options:

A.

Analyze the company's SSL certificates for internal details


B.

Examine email headers from past communications with the company


C.

Inspect public WHOIS records for hidden network data


D.

Utilize network scanning tools to map the company's IP range


Expert Solution
Questions # 74:

What is the proper response for a NULL scan if the port is open?

Options:

A.

SYN


B.

ACK


C.

FIN


D.

PSH


E.

RST


F.

No response


Expert Solution
Questions # 75:

A penetration tester identifies malware that monitors the activities of a user and secretly collects personal information, such as login credentials and browsing habits. What type of malware is this?

Options:

A.

Worm


B.

Rootkit


C.

Spyware


D.

Ransomware


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 61-75 out of questions