Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 101-120 out of questions
Questions # 101:

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.

What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

Options:

A.

Protocol analyzer


B.

Network sniffer


C.

Intrusion Prevention System (IPS)


D.

Vulnerability scanner


Expert Solution
Questions # 102:

What is the following command used for?

sqlmap.py -u "http://10.10.1.20/?p=1 &forumaction=search" -dbs

Options:

A.

Creating backdoors using SQL injection


B.

Enumerating the databases in the DBMS for the URL


C.

Retrieving SQL statements being executed on the database


D.

Searching database statements at the IP address given


Expert Solution
Questions # 103:

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

Options:

A.

Macro virus


B.

Stealth/Tunneling virus


C.

Cavity virus


D.

Polymorphic virus


Expert Solution
Questions # 104:

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?

Options:

A.

Traceroute


B.

Hping


C.

TCP ping


D.

Broadcast ping


Expert Solution
Questions # 105:

Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an attacker, noticed her activities several times and sent a fake email containing a deceptive page link to her social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and logged in to that page using her valid credentials. Which of the following tools is employed by Clark to create the spoofed email?

Options:

A.

PyLoris


B.

Slowloris


C.

Evilginx


D.

PLCinject


Expert Solution
Questions # 106:

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days. Sieve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed in the above scenario?

Options:

A.

Diversion theft


B.

Baiting


C.

Honey trap


D.

Piggybacking


Expert Solution
Questions # 107:

Which technique is commonly used by attackers to evade firewall detection?

Options:

A.

Spoofing source IP addresses to appear trusted


B.

Using open-source operating systems


C.

Using encrypted communication channels


D.

Social engineering employees


Expert Solution
Questions # 108:

While analyzing logs, you observe a large number of TCP SYN packets sent to various ports with no corresponding ACKs. What scanning technique was likely used?

Options:

A.

SYN scan (half-open scanning)


B.

XMAS scan


C.

SYN/ACK scan


D.

TCP Connect scan


Expert Solution
Questions # 109:

Which type of security feature stops vehicles from crashing through the doors of a building?

Options:

A.

Bollards


B.

Receptionist


C.

Mantrap


D.

Turnstile


Expert Solution
Questions # 110:

Which patch management strategy is most effective?

Options:

A.

External-only patches


B.

Automated patch management with monitoring


C.

Manual patching on live servers


D.

Applying all patches regardless of source


Expert Solution
Questions # 111:

As a cybersecurity professional at XYZ Corporation, you are tasked with investigating anomalies in system logs that suggest potential unauthorized activity. System administrators have detected repeated failed login attempts on a critical server, followed by a sudden surge in outbound data traffic. These indicators suggest a possible compromise. Given the sensitive nature of the system and the sophistication of the threat, what should be your initial course of action?

Options:

A.

Conduct real-time monitoring of the server, analyze logs for abnormal patterns, and identify the nature of the activity to formulate immediate countermeasures.


B.

Conduct a comprehensive audit of all outbound traffic and analyze destination IP addresses to map the attacker’s network.


C.

Immediately reset all server credentials and instruct all users to change their passwords.


D.

Immediately disconnect the affected server from the network to prevent further data exfiltration.


Expert Solution
Questions # 112:

You discover an unpatched Android permission-handling vulnerability on a device with fully updated antivirus software. What is the most effective exploitation approach that avoids antivirus detection?

Options:

A.

Develop a custom exploit using obfuscation techniques


B.

Use Metasploit to deploy a known payload


C.

Install a rootkit to manipulate the device


D.

Use SMS phishing to trick the user


Expert Solution
Questions # 113:

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.

What kind of attack is Susan carrying on?

Options:

A.

A sniffing attack


B.

A spoofing attack


C.

A man-in-the-middle attack


D.

A denial of service attack


Expert Solution
Questions # 114:

What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?

Options:

A.

Black-box


B.

Announced


C.

White-box


D.

Grey-box


Expert Solution
Questions # 115:

Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections. Which of the following attack techniques is used by Stella to compromise the web services?

Options:

A.

XML injection


B.

WS-Address spoofing


C.

SOAPAction spoofing


D.

Web services parsing attacks


Expert Solution
Questions # 116:

What tool can crack Windows SMB passwords simply by listening to network traffic?

Options:

A.

This is not possible


B.

Netbus


C.

NTFSDOS


D.

L0phtcrack


Expert Solution
Questions # 117:

Judy created a forum, one day. she discovers that a user is posting strange images without writing comments.

She immediately calls a security expert, who discovers that the following code is hidden behind those images:

<script>

document.writef); </script>

What issue occurred for the users who clicked on the image?

Options:

A.

The code inject a new cookie to the browser.


B.

The code redirects the user to another site.


C.

The code is a virus that is attempting to gather the users username and password.


D.

This php file silently executes the code and grabs the users session cookie and session ID.


Expert Solution
Questions # 118:

What two conditions must a digital signature meet?

Options:

A.

Has to be the same number of characters as a physical signature and must be unique.


B.

Has to be unforgeable, and has to be authentic.


C.

Must be unique and have special characters.


D.

Has to be legible and neat.


Expert Solution
Questions # 119:

Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network lo identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What is the type of vulnerability assessment that Morris performed on the target organization?

Options:

A.

internal assessment


B.

Passive assessment


C.

External assessment


D.

Credentialed assessment


Expert Solution
Questions # 120:

You are the lead cybersecurity analyst at a multinational corporation that uses a hybrid encryption system to secure inter-departmental communications. The system uses RSA encryption for key exchange and AES for data encryption, taking advantage of the strengths of both asymmetric and symmetric encryption. Each RSA

key pair has a size of 'n' bits, with larger keys providing more security at the cost of slower performance. The time complexity of generating an RSA key pair is O(n*2), and AES encryption has a time complexity of O(n). An attacker has developed a quantum algorithm with time complexity O((log n)*2) to crack RSA encryption. Given *n=4000' and variable ‘AES key size’, which scenario is likely to provide the best balance of security and

performance?

Options:

A.

AES key size=128 bits: This configuration provides less security than option A, but RSA key generation and AES encryption will be faster.


B.

AES key size=256 bits: This configuration provides a high level of security, but RSA key generation may be slow.


C.

AES key size=192 bits: This configuration is a balance between options A and B, providing moderate security and performance.


D.

AES key size=512 bits: This configuration provides the highest level of security but at a significant performance cost due to the large AES key size.


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 101-120 out of questions