New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions
Questions # 76:

During routine network monitoring, the blue team notices several LLMNR and NBT-NS broadcasts originating from a workstation attempting to resolve an internal hostname. They also observe suspicious responses coming from a non-corporate IP address that claims to be the requested host. Upon further inspection, the security team suspects that an attacker is impersonating network resources to capture authentication attempts. What type of password-cracking setup is likely being staged?

Options:

A.

Decrypt login tokens from wireless networks


B.

Use CPU resources to guess passphrases quickly


C.

Exploit name resolution to capture password hashes


D.

Match captured credentials with rainbow tables


Expert Solution
Questions # 77:

Heather’s company has decided to use a new customer relationship management tool. After performing the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only administrative task that Heather will need to perform is the management of user accounts. The provider will take care of the hardware, operating system, and software administration including patching and monitoring. Which of the following is this type of solution?

Options:

A.

SaaS


B.

IaaS


C.

CaaS


D.

PasS


Expert Solution
Questions # 78:

Your network infrastructure is under a SYN flood attack. The attacker has crafted an automated botnet to

simultaneously send 's' SYN packets per second to the server. You have put measures in place to manage ‘f

SYN packets per second, and the system is designed to deal with this number without any performance issues.

If 's' exceeds ‘f', the network infrastructure begins to show signs of overload. The system's response time

increases exponentially (24k), where 'k' represents each additional SYN packet above the ff limit. Now, considering 's=500' and different 'f values, in which scenario is the server most likely to experience overload and significantly increased response times?

Options:

A.

f=510: The server can handle 510 SYN packets per second, which is greater than what the attacker is sending. The system stays stable, and the response time remains unaffected


B.

f=495: The server can handle 495 SYN packets per second. The response time drastically rises (245 = 32 times the normal), indicating a probable system overload


C.

f=S05: The server can handle 505 SYN packets per second. In this case, the response time increases but not as drastically (245 = 32 times the normal), and the systern might still function, albeit slowly


D.

f=420: The server can handle 490 SYN packets per second. With 's' exceeding ‘f by 10, the response time shoots up (2410 = 1024 times the usual response time), indicating a system overload


Expert Solution
Questions # 79:

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?

Options:

A.

Bluesmacking


B.

BlueSniffing


C.

Bluejacking


D.

Bluesnarfing


Expert Solution
Questions # 80:

Which definition among those given below best describes a covert channel?

Options:

A.

A server program using a port that is not well known.


B.

Making use of a protocol in a way it is not intended to be used.


C.

It is the multiplexing taking place on a communication link.


D.

It is one of the weak channels used by WEP which makes it insecure


Expert Solution
Questions # 81:

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker Installed a scanner on a machine belonging to one of the vktims and scanned several machines on the same network to Identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?

Options:

A.

Proxy scanner


B.

Agent-based scanner


C.

Network-based scanner


D.

Cluster scanner


Expert Solution
Questions # 82:

Yancey is a network security administrator for a large electric company. He becomes disgruntled after learning that he will be laid off and decides to sabotage the company by placing logic bombs, backdoors, and other malware in the system. He does not care if his actions lead to jail time.

What would Yancey be considered?

Options:

A.

Yancey would be considered a Suicide Hacker


B.

Since he does not care about going to jail, he would be considered a Black Hat


C.

Because Yancey works for the company currently; he would be a White Hat


D.

Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing


Expert Solution
Questions # 83:

Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bab denies that he had ever sent a mail. What do you want to ““know”” to prove yourself that it was Bob who had send a mail?

Options:

A.

Non-Repudiation


B.

Integrity


C.

Authentication


D.

Confidentiality


Expert Solution
Questions # 84:

During a red team assessment of an enterprise LAN environment, the tester discovers an access switch that connects multiple internal workstations. The switch has no port security measures in place. To silently intercept communication between different hosts without deploying ARP poisoning or modifying the routing table, the tester launches a MAC flooding attack using the macof utility from the dsniff suite. This command sends thousands of Ethernet frames per minute, each with random, spoofed source MAC addresses. Soon after the flooding begins, the tester puts their network interface into promiscuous mode and starts capturing packets. They observe unicast traffic between internal machines appearing in their packet sniffer—traffic that should have been isolated. What internal switch behavior is responsible for this sudden exposure of isolated traffic?

Options:

A.

The switch performed ARP spoofing to misroute packets.


B.

The switch entered hub-like behavior due to a full CAM table.


C.

The interface performed DHCP starvation to capture broadcasts.


D.

The switch disabled MAC filtering due to duplicate address conflicts.


Expert Solution
Questions # 85:

Elliot is exploiting a web application vulnerable to SQL injection. He has introduced conditional timing delays to determine whether the injection is successful.

What type of SQL injection is Elliot most likely performing?

Options:

A.

Error-based SQL injection


B.

Blind SQL injection


C.

Union-based SQL injection


D.

NoSQL injection


Expert Solution
Questions # 86:

A penetration tester suspects that the web application's "Order History" page is vulnerable to SQL injection because it displays user orders based on an unprotected user ID parameter in the URL. What is the most appropriate approach to test this?

Options:

A.

Inject JavaScript into the URL parameter to test for Cross-Site Scripting (XSS)


B.

Modify the URL parameter to userID=1 OR 1=1 and observe if all orders are displayed


C.

Perform a directory traversal attack to access sensitive system files


D.

Use a brute-force attack on the login form to identify valid user credentials


Expert Solution
Questions # 87:

The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept.

What is the Wi-Fi encryption technology implemented by Debry Inc.?

Options:

A.

WEP


B.

WPA


C.

WPA2


D.

WPA3


Expert Solution
Questions # 88:

Allen, a professional pen tester, was hired by xpertTech solutWns to perform an attack simul-ation on the organization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. B/enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration.

identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?

Options:

A.

<1B>


B.

<00>


C.

<03>


D.

<20>


Expert Solution
Questions # 89:

Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications and unpatched security flaws in a computer system?

Options:

A.

Wireshark


B.

Maltego


C.

Metasploit


D.

Nessus


Expert Solution
Questions # 90:

What is GINA?

Options:

A.

Gateway Interface Network Application


B.

GUI Installed Network Application CLASS


C.

Global Internet National Authority (G-USA)


D.

Graphical Identification and Authentication DLL


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions