Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions
Questions # 76:

Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company. What is the API vulnerability revealed in the above scenario?

Options:

A.

Code injections


B.

Improper use of CORS


C.

No ABAC validation


D.

Business logic flaws


Expert Solution
Questions # 77:

Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for finding loopholes in the above scenario?

Options:

A.

UDP flood attack


B.

Ping-of-death attack


C.

Spoofed session flood attack


D.

Peer-to-peer attack


Expert Solution
Questions # 78:

A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire information related to the current time from the target host machine.

Which of the following Zenmap options must the analyst use to perform the ICMP timestamp ping scan?

Options:

A.

-PY


B.

-PU


C.

-PP


D.

-Pn


Expert Solution
Questions # 79:

Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy.

What is the type of attack Bob performed on Kate in the above scenario?

Options:

A.

Man-in-the-disk attack


B.

aLTEr attack


C.

SIM card attack


D.

Spearphone attack


Expert Solution
Questions # 80:

What is the algorithm used by LM for Windows 2000 SAM?

Options:

A.

MD4


B.

DES


C.

SHA


D.

SSL


Expert Solution
Questions # 81:

Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?

Options:

A.

Presentation tier


B.

Application Layer


C.

Logic tier


D.

Data tier


Expert Solution
Questions # 82:

How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

Options:

A.

There is no way to tell because a hash cannot be reversed


B.

The rightmost portion of the hash is always the same


C.

The hash always starts with AB923D


D.

The leftmost portion of the hash is always the same


E.

A portion of the hash will be all 0's


Expert Solution
Questions # 83:

George is a security professional working for iTech Solutions. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100 m. What is the short-range wireless communication technology George employed in the above scenario?

Options:

A.

MQTT


B.

LPWAN


C.

Zigbee


D.

NB-IoT


Expert Solution
Questions # 84:

what firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

Options:

A.

Decoy scanning


B.

Packet fragmentation scanning


C.

Spoof source address scanning


D.

Idle scanning


Expert Solution
Questions # 85:

Which of the following programs is usually targeted at Microsoft Office products?

Options:

A.

Polymorphic virus


B.

Multipart virus


C.

Macro virus


D.

Stealth virus


Expert Solution
Questions # 86:

Which system consists of a publicly available set of databases that contain domain name registration contact information?

Options:

A.

WHOIS


B.

CAPTCHA


C.

IANA


D.

IETF


Expert Solution
Questions # 87:

Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks. What is the type of threat intelligence collected by Arnold in the above scenario?

Options:

A.

Strategic threat intelligence


B.

Tactical threat intelligence


C.

Operational threat intelligence


D.

Technical threat intelligence


Expert Solution
Questions # 88:

Which of the following steps for risk assessment methodology refers to vulnerability identification?

Options:

A.

Determines if any flaws exist in systems, policies, or procedures


B.

Assigns values to risk probabilities; Impact values


C.

Determines risk probability that vulnerability will be exploited (High, Medium, Low)


D.

Identifies sources of harm to an IT system (Natural, Human, Environmental)


Expert Solution
Questions # 89:

Firewalk has just completed the second phase (the scanning phase), and a technician receives the output shown below. What conclusions can be drawn based on these scan results?

TCP port 21 no response

TCP port 22 no response

TCP port 23 Time-to-live exceeded

Options:

A.

The lack of response from ports 21 and 22 indicate that those services are not running on the destination server


B.

The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error


C.

The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall


D.

The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host


Expert Solution
Questions # 90:

Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?

Options:

A.

getsystem


B.

getuid


C.

keylogrecorder


D.

autoroute


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions