Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 81-100 out of questions
Questions # 81:

By using a smart card and pin, you are using a two-factor authentication that satisfies

Options:

A.

Something you are and something you remember


B.

Something you have and something you know


C.

Something you know and something you are


D.

Something you have and something you are


Expert Solution
Questions # 82:

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.

How would an attacker exploit this design by launching TCP SYN attack?

Options:

A.

Attacker generates TCP SYN packets with random destination addresses towards a victim host


B.

Attacker floods TCP SYN packets with random source addresses towards a victim host


C.

Attacker generates TCP ACK packets with random source addresses towards a victim host


D.

Attacker generates TCP RST packets with random source addresses towards a victim host


Expert Solution
Questions # 83:

A penetration tester alters the "file" parameter in a web application (e.g., view?file=report.txt) to ../../../../etc/passwd and successfully accesses restricted system files. What attack method does this scenario illustrate?

Options:

A.

Conduct a brute-force attack to obtain administrative credentials


B.

Use directory traversal sequences in URL parameters to retrieve unauthorized system content


C.

Inject malicious scripts into web pages to manipulate content via XSS vulnerabilities


D.

Exploit buffer overflow issues by injecting oversized data in HTTP request headers


Expert Solution
Questions # 84:

A penetration tester needs to identify open ports and services on a target network without triggering the organization's intrusion detection systems, which are configured to detect high-volume traffic and common scanning techniques. To achieve stealth, the tester decides to use a method that spreads out the scan over an extended period. Which scanning technique should the tester employ to minimize the risk of detection?

Options:

A.

Use a stealth scan by adjusting the scan timing options to be slow and random


B.

Perform a TCP SYN scan using a fast scan rate


C.

Execute a UDP scan targeting all ports simultaneously


D.

Conduct a TCP Xmas scan sending packets with all flags set


Expert Solution
Questions # 85:

Gavin owns a white-hat firm and is performing a website security audit. He begins with a scan looking for misconfigurations and outdated software versions. Which tool is he most likely using?

Options:

A.

Nikto


B.

Nmap


C.

Metasploit


D.

Armitage


Expert Solution
Questions # 86:

During the process of encryption and decryption, what keys are shared?

Options:

A.

Private keys


B.

User passwords


C.

Public keys


D.

Public and private keys


Expert Solution
Questions # 87:

A penetration tester targets a WPA2-PSK wireless network. The tester captures the handshake and wants to speed up cracking the pre-shared key. Which approach is most effective?

Options:

A.

Conduct a Cross-Site Scripting (XSS) attack on the router's login page


B.

Use a brute-force attack to crack the pre-shared key manually


C.

Use a dictionary attack with a large wordlist to crack the WPA2 key


D.

Perform a SQL injection attack to bypass the WPA2 authentication


Expert Solution
Questions # 88:

You are a cybersecurity analyst at a global banking corporation and suspect a backdoor attack due to abnormal outbound traffic during non-working hours, unexplained reboots, and modified system files. Which combination of measures would be most effective to accurately identify and neutralize the backdoor while ensuring system integrity?

Options:

A.

Review firewall logs, analyze traffic, and immediately reboot systems


B.

Monitor system and file activity, apply anomaly detection, and use advanced anti-malware tools


C.

Enforce strong passwords, MFA, and regular vulnerability assessments


D.

Apply ACLs, patch systems, and audit user privileges


Expert Solution
Questions # 89:

Larry, a security professional in an organization, has noticed some abnormalities In the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a countermeasures to secure the accounts on the web server.

Which of the following countermeasures must Larry implement to secure the user accounts on the web server?

Options:

A.

Enable unused default user accounts created during the installation of an OS


B.

Enable all non-interactive accounts that should exist but do not require interactive login


C.

Limit the administrator or toot-level access to the minimum number of users


D.

Retain all unused modules and application extensions


Expert Solution
Questions # 90:

During a black-box security assessment of a large enterprise network, the penetration tester scans the internal environment and identifies that TCP port 389 is open on a domain controller. Upon further investigation, the tester runs the ldapsearch utility without providing any authentication credentials and successfully retrieves a list of usernames, email addresses, and departmental affiliations from the LDAP directory. The tester notes that this sensitive information was disclosed without triggering any access control mechanisms or requiring login credentials. Based on this behavior, what type of LDAP access mechanism is most likely being exploited?

Options:

A.

LDAP over SSL (LDAPS)


B.

Authenticated LDAP with Kerberos


C.

Anonymous LDAP binding


D.

LDAP via RADIUS relay


Expert Solution
Questions # 91:

what is the port to block first in case you are suspicious that an loT device has been compromised?

Options:

A.

22


B.

443


C.

48101


D.

80


Expert Solution
Questions # 92:

You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabled Windows accounts?

Options:

A.

John the Ripper


B.

SET


C.

CHNTPW


D.

Cain & Abel


Expert Solution
Questions # 93:

A company’s online service is under a multi-vector DoS attack using SYN floods and HTTP GET floods. Firewalls and IDS cannot stop the outage. What advanced defense should the company implement?

Options:

A.

Configure the firewall to block all incoming SYN packets from external IPs


B.

Use DDoS mitigation services that offer multi-layer protection


C.

Deploy a Web Application Firewall (WAF) with anomaly detection


D.

Increase server bandwidth and apply basic rate limiting


Expert Solution
Questions # 94:

During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?

Options:

A.

Hping3 -110.0.0.25 --ICMP


B.

Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4


C.

Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 -flood


D.

Hping3-210.0.0.25-p 80


Expert Solution
Questions # 95:

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?

Options:

A.

Rootkit


B.

Trojan


C.

Worm


D.

Adware


Expert Solution
Questions # 96:

Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device. In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip.

Which of the following types of fault injection attack is performed by Robert in the above scenario?

Options:

A.

Frequency/voltage tampering


B.

Optical, electromagnetic fault injection (EMFI)


C.

Temperature attack


D.

Power/clock/reset glitching


Expert Solution
Questions # 97:

Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP inquiries over the network.

Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.

Options:

A.

SNMPUtil


B.

SNScan


C.

SNMPScan


D.

SolarWinds IP Network Browser


E.

NMap


Expert Solution
Questions # 98:

A Certified Ethical Hacker (CEH) is given the task to perform an LDAP enumeration on a target system. The system is secured and accepts connections only on secure LDAP. The CEH uses Python for the enumeration process. After successfully installing LDAP and establishing a connection with the target, he attempts to fetch details like the domain name and naming context but is unable to receive the expected response. Considering the circumstances, which of the following is the most plausible reason for this situation?

Options:

A.

The Python version installed on the CEH's machine is incompatible with the Idap3 library


B.

The secure LDAP connection was not properly initialized due to a lack of 'use_ssl = True' in the server object creation


C.

The enumeration process was blocked by the target system's intrusion detection system


D.

The system failed to establish a connection due to an incorrect port number


Expert Solution
Questions # 99:

Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevent hackers from decrypting the data flow between the endpoints.

What is the technique followed by Peter to send files securely through a remote connection?

Options:

A.

DMZ


B.

SMB signing


C.

VPN


D.

Switch network


Expert Solution
Questions # 100:

Which DNS resource record can indicate how long any "DNS poisoning" could last?

Options:

A.

MX


B.

SOA


C.

NS


D.

TIMEOUT


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 81-100 out of questions