Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions
Questions # 76:

During a penetration test at a financial services firm in Boston, ethical hacker Daniel simulates a DDoS against the customer portal. To handle the surge, the IT team sets a rule that caps the number of requests a single user can make per second; aggressive connections are delayed or dropped while most legitimate customers continue to use the service.

Which countermeasure strategy is the IT team primarily using?

Options:

A.

Rate Limiting


B.

Shutting Down Services


C.

Absorb the Attack


D.

Degrading Services


Expert Solution
Questions # 77:

A penetration tester identifies that a web application ' s login form is not using secure password hashing mechanisms, allowing attackers to steal passwords if the database is compromised. What is the best approach to exploit this vulnerability?

Options:

A.

Perform a dictionary attack using a list of commonly used passwords against the stolen hash values


B.

Input a SQL query to check for SQL injection vulnerabilities in the login form


C.

Conduct a brute-force attack on the login form to guess weak passwords


D.

Capture the login request using a proxy tool and attempt to decrypt the passwords


Expert Solution
Questions # 78:

A penetration tester is conducting a security assessment for a client and needs to capture sensitive information transmitted across multiple VLANs without being detected by the organization ' s security monitoring systems. The network employs strict VLAN segmentation and port security measures. Which advanced sniffing technique should the tester use to discreetly intercept and analyze traffic across all VLANs?

Options:

A.

Deploy a rogue DHCP server to redirect network traffic


B.

Exploit a VLAN hopping vulnerability to access multiple VLANs


C.

Implement switch port mirroring on all VLANs


D.

Use ARP poisoning to perform a man-in-the-middle attack


Expert Solution
Questions # 79:

A penetration tester is assessing the security of a corporate wireless network that uses WPA2-Enterprise encryption with RADIUS authentication. The tester wants to perform a man-in-the-middle attack by tricking wireless clients into connecting to a rogue access point. What is the most effective method to achieve this?

Options:

A.

Set up a fake access point with the same SSID and use a de-authentication attack


B.

Use a brute-force attack to crack the WPA2 encryption directly


C.

Perform a dictionary attack on the RADIUS server to retrieve credentials


D.

Execute a Cross-Site Scripting (XSS) attack on the wireless controller ' s login page


Expert Solution
Questions # 80:

A cybersecurity analyst monitors competitors’ web content for changes indicating strategic shifts. Which missing component is most crucial for effective passive surveillance?

Options:

A.

Participating in competitors’ blogs and forums


B.

Setting up Google Alerts for competitor names and keywords


C.

Using a VPN to hide the analyst’s IP address


D.

Hiring a third party to hack competitor databases


Expert Solution
Questions # 81:

Using nbtstat -A < IP > , NetBIOS names including < 20 > and < 03 > are retrieved, but shared folders cannot be listed. Why?

Options:

A.

File and printer sharing is disabled


B.

NetBIOS runs on a non-standard port


C.

nbtstat cannot enumerate shared folders


D.

The host is not in an AD domain


Expert Solution
Questions # 82:

At Norwest Freight Services, a rotating audit team is asked to evaluate host exposure across multiple departments following a suspected misconfiguration incident. Simon, a junior analyst working from a trusted subnet, initiates a network-wide scan using the default configuration profile of his assessment tool. The tool completes quickly but returns only partial insights such as open service ports and version banners while deeper registry settings, user policies, and missing patches remain unreported. Midway through the report review, Simon notices that system login prompts were never triggered during scanning, and no credential failures were logged in the SIEM.

Which type of vulnerability scan BEST explains the behavior observed in Simon’s assessment?

Options:

A.

Unauthenticated Scanning


B.

Authenticated Scanning


C.

Internal Scan


D.

Credentialed Scanning


Expert Solution
Questions # 83:

Which scenario best describes a slow, stealthy scanning technique?

Options:

A.

FIN scanning


B.

TCP connect scanning


C.

Xmas scanning


D.

Zombie-based idle scanning


Expert Solution
Questions # 84:

A penetration tester is evaluating a web application that does not properly validate the authenticity of HTTP requests. The tester suspects the application is vulnerable to Cross-Site Request Forgery (CSRF). Which approach should the tester use to exploit this vulnerability?

Options:

A.

Execute a directory traversal attack to access restricted server files


B.

Create a malicious website that sends a crafted request on behalf of the user when visited


C.

Perform a brute-force attack on the application’s login page to guess weak credentials


D.

Inject a SQL query into the input fields to perform SQL injection


Expert Solution
Questions # 85:

In a high-stakes cybersecurity exercise in Boston, Emily, an ethical hacker, is tasked with tracing a mock phishing email sent to a healthcare provider’s staff. Using the email header, she identifies a series of IP addresses and server details, including multiple timestamps and server names. Her objective is to pinpoint the exact moment the email was processed by the sender’s system. As part of her reconnaissance, what specific detail from the email header should Emily examine to determine this information?

Options:

A.

Date and time of message sent


B.

Sender’s mail server


C.

Date and time received by the originator’s email servers


D.

Authentication system used by sender’s mail server


Expert Solution
Questions # 86:

A penetration tester is testing a web application ' s product search feature, which takes user input and queries the database. The tester suspects inadequate input sanitization. What is the best approach to confirm the presence of SQL injection?

Options:

A.

Inject a script to test for Cross-Site Scripting (XSS)


B.

Input DROP TABLE products; -- to see if the table is deleted


C.

Enter 1 ' OR ' 1 ' = ' 1 to check if all products are returned


D.

Use directory traversal syntax to access restricted files on the server


Expert Solution
Questions # 87:

Attackers persisted by modifying legitimate system utilities and services. What key step helps prevent similar threats?

Options:

A.

Weekly off-site backups


B.

Monitor file hashes of sensitive executables


C.

Update antivirus and firewalls


D.

Disable unused ports


Expert Solution
Questions # 88:

A penetration tester targets a WPA2-PSK wireless network. The tester captures the handshake and wants to speed up cracking the pre-shared key. Which approach is most effective?

Options:

A.

Conduct a Cross-Site Scripting (XSS) attack on the router ' s login page


B.

Use a brute-force attack to crack the pre-shared key manually


C.

Use a dictionary attack with a large wordlist to crack the WPA2 key


D.

Perform a SQL injection attack to bypass the WPA2 authentication


Expert Solution
Questions # 89:

A penetration tester is assessing a web application that uses dynamic SQL queries for searching users in the database. The tester suspects the search input field is vulnerable to SQL injection. What is the best approach to confirm this vulnerability?

Options:

A.

Input DROP TABLE users; -- into the search field to test if the database query can be altered


B.

Inject JavaScript into the search field to test for Cross-Site Scripting (XSS)


C.

Use a directory traversal attack to access server configuration files


D.

Perform a brute-force attack on the user login page to guess weak passwords


Expert Solution
Questions # 90:

In your role as a cybersecurity analyst at a large e-commerce company, you have been tasked with reinforcing the firm’s defenses against potential Denial-of-Service (DoS) attacks. During a recent review, you noticed several IP addresses generating excessive traffic, causing an unusually high server load. Inspection of packets revealed that the TCP three-way handshake was never completed, leaving multiple connections in a SYN_RECEIVED state. The intent appears to be saturating server resources without completing connections. Which type of DoS attack is most likely being executed?

Options:

A.

SYN Flood


B.

Smurf Attack


C.

Ping of Death


D.

UDP Flood


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions