Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions
Questions # 61:

In a controlled testing environment in Houston, Sarah, an ethical hacker, is tasked with evaluating the security posture of a financial firm’s network using the cyber kill chain methodology. She begins by simulating an attack, starting with gathering publicly available data about the company’s employees and infrastructure. Next, she plans to craft a mock phishing email to test employee responses, followed by deploying a harmless payload to assess system vulnerabilities. As part of her authorized penetration test, what phase of the cyber kill chain should Sarah prioritize to simulate the adversary’s approach effectively?

Options:

A.

Exploitation


B.

Reconnaissance


C.

Weaponization


D.

Delivery


Expert Solution
Questions # 62:

During an investigation, an ethical hacker discovers that a web application’s API has been compromised, leading to unauthorized access and data manipulation. The attacker is using webhooks and a webshell. To prevent further exploitation, which of the following actions should be taken?

Options:

A.

Implement a Web Application Firewall (WAF) with rules to block webshell traffic and increase the logging verbosity of webhooks.


B.

Perform regular code reviews for the webhooks and modify the API to block connections from unknown IP addresses.


C.

Harden the web server security, add multi-factor authentication for API users, and restrict the execution of scripts server-side.


D.

Implement input validation on all API endpoints, review webhook payloads, and schedule regular scanning for webshells.


Expert Solution
Questions # 63:

A penetration tester has gained access to a target system using default credentials. What is the most effective next step to escalate privileges on the system?

Options:

A.

Perform a denial-of-service (DoS) attack to crash the system


B.

Use a known local privilege escalation vulnerability to gain admin access


C.

Execute a Cross-Site Scripting (XSS) attack on the system ' s login page


D.

Use a dictionary attack to brute-force the root password


Expert Solution
Questions # 64:

Maya Patel from SecureHorizon Consulting is called to investigate a security breach at Dallas General Hospital in Dallas, Texas, where a lost employee smartphone was used to access sensitive patient records. During her analysis, Maya finds that the hospital ' s mobile security policy failed to include a contingency to remotely secure compromised devices, allowing continued access to confidential data even after the device was lost. Based on this gap, which mobile security guideline should Maya recommend preventing similar incidents?

Options:

A.

Utilize a secure VPN connection while accessing public Wi-Fi networks


B.

Install device tracking software that allows the device to be located remotely


C.

Register devices with a remote locate and wipe facility


D.

Use anti-virus and data loss prevention DLP solutions


Expert Solution
Questions # 65:

In Denver, Colorado, ethical hacker Sophia Nguyen is hired by Rocky Mountain Insurance to assess the effectiveness of their network security controls. During her penetration test, she attempts to evade the company ' s firewall by fragmenting malicious packets to avoid detection. The IT team, aware of such techniques, has implemented a security measure to analyze packet contents beyond standard headers. Sophia ' s efforts are thwarted as the system identifies and blocks her fragmented packets.

Which security measure is the IT team most likely using to counter Sophia ' s firewall evasion attempt?

Options:

A.

Deep Packet Inspection


B.

Anomaly-Based Detection


C.

Signature-Based Detection


D.

Stateful Packet Inspection


Expert Solution
Questions # 66:

Ethical hacker Ryan Brooks, a skilled penetration tester from Austin, Texas, was hired by Skyline Aeronautics, a leading aerospace firm in Denver, to conduct a security assessment. One stormy morning, Ryan noticed an unexpected lag in the routine system update process while running his tests, sparking his curiosity. During a late-night session, he observed a junior analyst, Chris Miller, cautiously modifying a legacy server’s configuration, including a scheduled task set to a specific date. The lead developer, Jessica Hayes, casually mentioned receiving an odd email from an unfamiliar source, which she ignored as clutter. As Ryan probed deeper, he detected a faint increase in network activity only after the scheduled date passed, and a systems admin, Mark Thompson, quickly pointed out some unusual code traces on a dormant workstation.

Which type of threat best characterizes this attack?

Options:

A.

Logic Bomb


B.

Fileless Malware


C.

Advanced Persistent Threat APT


D.

Ransomware


Expert Solution
Questions # 67:

A penetration tester evaluates a company ' s susceptibility to advanced social engineering attacks targeting its executive team. Using detailed knowledge of recent financial audits and ongoing projects, the tester crafts a highly credible pretext to deceive executives into revealing their network credentials. What is the most effective social engineering technique the tester should employ to obtain the necessary credentials without raising suspicion?

Options:

A.

Send a mass phishing email with a link to a fake financial report


B.

Create a convincing fake email from the CFO asking for immediate credential verification


C.

Conduct a phone call posing as an external auditor requesting access to financial systems


D.

Develop a spear-phishing email that references specific financial audit details and requests login confirmation


Expert Solution
Questions # 68:

A known vulnerability exists on a production server, but patching is delayed due to operational constraints. What immediate action can reduce risk without disrupting operations?

Options:

A.

Conduct a full penetration test


B.

Shut down the server


C.

Monitor traffic continuously


D.

Implement Virtual Patching


Expert Solution
Questions # 69:

A penetration tester targets a company ' s executive assistants by referencing upcoming board meetings in an email requesting access to confidential agendas. What is the most effective social engineering technique to obtain the necessary credentials without raising suspicion?

Options:

A.

Create a personalized email referencing specific meetings and request access


B.

Call posing as a trusted IT support to verify credentials


C.

Send a mass phishing email with a fake meeting link


D.

Develop a fake LinkedIn profile to connect and request information


Expert Solution
Questions # 70:

A corporation uses both hardware-based and cloud-based solutions to distribute incoming traffic and absorb DDoS attacks, ensuring legitimate requests remain unaffected. Which DDoS mitigation strategy is being utilized?

Options:

A.

Black Hole Routing


B.

Load Balancing


C.

Sinkholing


D.

Rate Limiting


Expert Solution
Questions # 71:

During a late-night shift at IronWave Logistics in Seattle, cybersecurity analyst Marcus Chen notices a pattern of high-port outbound traffic from over a dozen internal machines to a previously unseen external IP. Each system had recently received a disguised shipping report, which, when opened, initiated a process that spread autonomously to other workstations using shared folders and stolen credentials. Upon investigation, Marcus discovers that the machines now contain hidden executables that silently accept remote instructions and occasionally trigger coordinated background tasks. The compromised endpoints are behaving like zombies, and malware analysts confirm that the payload used worm-like propagation to deliver a backdoor component across the network.

Which is the most likely objective behind this attack?

Options:

A.

To exfiltrate sensitive information and tracking data


B.

To execute a ransomware payload and encrypt all data


C.

To establish a botnet for remote command and control


D.

To deploy a Remote Access Trojan (RAT) for stealthy surveillance


Expert Solution
Questions # 72:

At a private aerospace research facility in Mesa, Arizona, an executive raises concerns after sensitive discussion points from speakerphone meetings begin surfacing externally. The device shows no indicators of active audio recording, and application permission history does not reflect recent camera or microphone authorization changes. A forensic mobile analysis identifies that an installed application has been continuously reading motion sensor output while the phone ' s loudspeaker is active. The collected sensor data was later transmitted to a remote server, where acoustic characteristics were reconstructed from the recorded measurements. Identify the attack technique responsible for this compromise.

Options:

A.

Spearphone Attack


B.

Storm Breaker Abuse


C.

Android Camera Hijack Attack


D.

Camfecting


Expert Solution
Questions # 73:

Packet fragmentation is used as an evasion technique. Which IDS configuration best counters this?

Options:

A.

Recognizing regular fragmented packet intervals


B.

Anomaly-based IDS detecting irregular traffic patterns


C.

Rejecting all fragmented packets


D.

Signature-based IDS detecting fragmented packet signatures


Expert Solution
Questions # 74:

As a Certified Ethical Hacker, you are assessing a corporation’s serverless cloud architecture. The organization experienced an attack where a user manipulated a function-as-a-service (FaaS) component to execute malicious commands. The root cause was traced to an insecure third-party API used within a serverless function. What is the most effective countermeasure to strengthen the security posture?

Options:

A.

Regularly updating serverless functions to reduce vulnerabilities.


B.

Using a Cloud Access Security Broker (CASB) to enforce third-party policies.


C.

Deploying a Cloud-Native Security Platform (CNSP) for full cloud protection.


D.

Implementing function-level permissions and enforcing the principle of least privilege.


Expert Solution
Questions # 75:

A cybersecurity consultant suspects attackers are attempting to evade an Intrusion Detection System (IDS). Which technique is most likely being used?

Options:

A.

Deploying self-replicating malware


B.

Fragmenting malicious packets into smaller segments


C.

Flooding the IDS with ICMP packets


D.

Sending phishing emails


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions