Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions
Questions # 91:

A fintech startup in Austin, Texas deploys several virtual machines within a public cloud environment. During an authorized cloud security assessment, a tester uploads a small script to one of the instances through a web application vulnerability. After executing the script locally on the instance, the tester retrieves temporary access credentials associated with the instance ' s assigned role. These credentials are then used to enumerate storage resources and access additional cloud services within the same account. Which cloud attack technique best corresponds to this activity?

Options:

A.

Cloud Snooper Attack


B.

Wrapping Attack


C.

IMDS Attack


D.

CP DoS Attack


Expert Solution
Questions # 92:

A penetration tester is assessing a company ' s executive team for vulnerability to sophisticated social engineering attacks by impersonating a trusted vendor and leveraging internal communications. What is the most effective social engineering technique to obtain sensitive executive credentials without being detected?

Options:

A.

Develop a fake social media profile to connect with executives and request private information


B.

Conduct a phone call posing as the CEO to request immediate password changes


C.

Create a targeted spear-phishing email that references recent internal projects and requests credential verification


D.

Send a mass phishing email with a malicious link disguised as a company-wide update


Expert Solution
Questions # 93:

As a security analyst, you are testing a company’s network for potential vulnerabilities. You suspect an attacker may be using MAC flooding to compromise network switches and sniff traffic. Which of the following indicators would most likely confirm your suspicion?

Options:

A.

An increased number of ARP requests in network traffic.


B.

Multiple MAC addresses assigned to a single IP address.


C.

Multiple IP addresses assigned to a single MAC address.


D.

Numerous MAC addresses associated with a single switch port.


Expert Solution
Questions # 94:

A global media streaming platform experiences traffic surges every 10 minutes, with spikes over 300 Gbps followed by quiet intervals. Which DDoS attack explains this behavior?

Options:

A.

UDP flood sustained attack


B.

Recursive HTTP GET flood


C.

Permanent DoS (PDoS)


D.

Pulse Wave attack


Expert Solution
Questions # 95:

During a cryptographic audit of a legacy system, a security analyst observes that an outdated block cipher is leaking key-related information when analyzing large sets of plaintext–ciphertext pairs. What approach might an attacker exploit here?

Options:

A.

Launch a key replay through IV duplication


B.

Use linear approximations to infer secret bits


C.

Modify the padding to obtain plaintext


D.

Attack the hash algorithm for collisions


Expert Solution
Questions # 96:

An ethical hacker needs to enumerate user accounts and shared resources within a company ' s internal network without raising any security alerts. The network consists of Windows servers running default configurations. Which method should the hacker use to gather this information covertly?

Options:

A.

Deploy a packet sniffer to capture and analyze network traffic


B.

Perform a DNS zone transfer to obtain internal domain details


C.

Exploit null sessions to connect anonymously to the IPC$ share


D.

Utilize SNMP queries to extract user information from network devices


Expert Solution
Questions # 97:

Which scenario best describes a slow, stealthy scanning technique?

Options:

A.

FIN scanning


B.

TCP connect scanning


C.

Xmas scanning


D.

Zombie-based idle scanning


Expert Solution
Questions # 98:

A penetration tester finds that a web application does not properly validate user input and is vulnerable to reflected Cross-Site Scripting (XSS). What is the most appropriate approach to exploit this vulnerability?

Options:

A.

Perform a brute-force attack on the user login form to steal credentials


B.

Embed a malicious script in a URL and trick a user into clicking the link


C.

Inject a SQL query into the search form to attempt SQL injection


D.

Use directory traversal to access sensitive files on the server


Expert Solution
Questions # 99:

A web server was compromised through DNS hijacking. What would most effectively prevent this in the future?

Options:

A.

Changing IP addresses


B.

Regular patching


C.

Implementing DNSSEC


D.

Using LAMP architecture


Expert Solution
Questions # 100:

In Austin, Texas, ethical hacker Michael Reyes is conducting a red team exercise for Horizon Tech, a software development firm. During his assessment, Michael crafts a malicious link that appears to lead to the company ' s internal project management portal. When an unsuspecting employee clicks the link, it redirects them to a login session that Michael has already initialized with the server. After the employee logs in, Michael uses that session to access the portal in a controlled test, demonstrating a vulnerability to the IT team.

Which session hijacking technique is Michael using in this red team exercise?

Options:

A.

Session donation attack


B.

Session replay attack


C.

Session sniffing


D.

Session fixation attack


Expert Solution
Questions # 101:

While assessing a web server, a tester sends malformed HTTP requests and compares responses to identify the server type and version. What technique is being employed?

Options:

A.

Fingerprinting server identity using banner-grabbing techniques


B.

Sending phishing emails to extract web server login credentials


C.

Conducting session fixation using malformed cookie headers


D.

Injecting scripts into headers for persistent XSS attacks


Expert Solution
Questions # 102:

During a red team test, a web application dynamically builds SQL queries using a numeric URL parameter. The tester sends the following request:

http://vulnerableapp.local/view.php?id=1; DROP TABLE users;

The application throws errors and the users table is deleted. Which SQL injection technique was used?

Options:

A.

UNION-based SQL injection


B.

Stacked (Piggybacked) queries


C.

Boolean-based SQL injection


D.

Error-based SQL injection


Expert Solution
Questions # 103:

A financial institution in San Francisco suffers a breach where attackers install malware that captures customer account credentials. The stolen data is then sold on underground forums for profit. No political or social statements are made, and the attackers remain anonymous while continuing to target similar organizations for financial gain. Based on this activity, what category of hacker is most likely responsible?

Options:

A.

Black Hat hackers


B.

Hacktivists


C.

Script Kiddies


D.

White Hat hackers


Expert Solution
Questions # 104:

In the vibrant startup scene of Austin, Texas, ethical hacker Daniel Ruiz is hired by TechNexus, a U.S.-based logistics software provider, to evaluate their internal administration portal. During testing, Daniel observes that certain input fields forward user-supplied data directly to underlying system functions. By carefully crafting his entries, he is able to trigger execution of unexpected system commands, resulting in unauthorized control over the operating environment. His findings reveal that the flaw stems from poor validation of input processed by system-level functions.

Which vulnerability is Daniel most likely demonstrating?

Options:

A.

Shell Injection


B.

LDAP Injection


C.

SQL Injection


D.

Cross-Site Scripting (XSS)


Expert Solution
Questions # 105:

During enumeration, a tool sends requests to UDP port 161 and retrieves a large list of installed software due to a publicly known community string. What enabled this technique to work so effectively?

Options:

A.

Unencrypted FTP services storing software data


B.

The SNMP agent allowed anonymous bulk data queries due to default settings


C.

Remote access to encrypted Windows registry keys


D.

SNMP trap messages logged in plain text


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions