New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 91-105 out of questions
Questions # 91:

Given below are different steps involved in the vulnerability-management life cycle:

Remediation

Identify assets and create a baseline

Verification

Monitor

Vulnerability scan

Risk assessment

Identify the correct sequence of steps involved in vulnerability management.

Options:

A.

2 → 5 → 6 → 1 → 3 → 4


B.

2 → 1 → 5 → 6 → 4 → 3


C.

2 → 4 → 5 → 3 → 6 → 1


D.

1 → 2 → 3 → 4 → 5 → 6


Expert Solution
Questions # 92:

At what stage of the cyber kill chain theory model does data exfiltration occur?

Options:

A.

Actions on objectives


B.

Weaponization


C.

installation


D.

Command and control


Expert Solution
Questions # 93:

A penetration tester is tasked with uncovering historical content from a company’s website, including previously exposed login portals or sensitive internal pages. Direct interaction with the live site is prohibited due to strict monitoring policies. To stay undetected, the tester decides to explore previously indexed snapshots of the organization’s web content saved by external sources. Which approach would most effectively support this passive information-gathering objective?

Options:

A.

Search with intext:"login" site:target.com to retrieve login data


B.

Use the link: operator to find backlinks to login portals


C.

Apply the cache: operator to view Google's stored versions of target pages


D.

Use the intitle:login operator to list current login pages


Expert Solution
Questions # 94:

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

Options:

A.

Reverse Social Engineering


B.

Tailgating


C.

Piggybacking


D.

Announced


Expert Solution
Questions # 95:

During a physical penetration test simulating a social engineering attack, a threat actor walks into the lobby of a target organization dressed as a field technician from a known external vendor. Carrying a fake ID badge and referencing a known company name, the attacker confidently claims they’ve been dispatched to perform a routine server room upgrade. Using internal-sounding terminology and referencing real employee names gathered via OSINT, the individual conveys urgency. The receptionist, recognizing the vendor name and the convincing language, allows access without verifying the credentials.

Options:

A.

Perceived authority and reliance on third-party familiarity


B.

Leaked credentials on public networks and forums


C.

Trust in physical security logs used by security teams


D.

Misconfigured network segmentation allowing unauthorized access


Expert Solution
Questions # 96:

Which results will be returned with the following Google search query?

site:target.com –site:Marketing.target.com accounting

Options:

A.

Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.


B.

Results matching all words in the query.


C.

Results for matches on target.com and Marketing.target.com that include the word “accounting”


D.

Results matching “accounting” in domain target.com but not on the site Marketing.target.com


Expert Solution
Questions # 97:

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

Options:

A.

Spanning tree


B.

Dynamic ARP Inspection (DAI)


C.

Port security


D.

Layer 2 Attack Prevention Protocol (LAPP)


Expert Solution
Questions # 98:

Which access control mechanism allows for multiple systems to use a central authentication server (CAS) that permits users to authenticate once and gain access to multiple systems?

Options:

A.

Role Based Access Control (RBAC)


B.

Discretionary Access Control (DAC)


C.

Single sign-on


D.

Windows authentication


Expert Solution
Questions # 99:

A system administrator observes that several machines in the network are repeatedly sending out traffic to unknown IP addresses. Upon inspection, these machines were part of a coordinated spam campaign. What is the most probable cause?

Options:

A.

Keyloggers were harvesting user credentials


B.

Devices were enslaved into a botnet network


C.

Browsers were redirected to adware-injected sites


D.

Worms exploited zero-day vulnerabilities


Expert Solution
Questions # 100:

Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the Integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT. POST. GET. and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario?

Options:

A.

JSON-RPC


B.

SOAP API


C.

RESTful API


D.

REST API


Expert Solution
Questions # 101:

Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

Options:

A.

 tcptrace


B.

 Nessus


C.

 OpenVAS


D.

 tcptraceroute


Expert Solution
Questions # 102:

During a covert red team engagement, a penetration tester is tasked with identifying live hosts in a target organization’s internal subnet (10.0.0.0/24) without triggering intrusion detection systems (IDS). To remain undetected, the tester opts to use the command nmap -sn -PE 10.0.0.0/24, which results in several "Host is up" responses, even though the organization’s IDS is tuned to detect high-volume scans. After the engagement, the client reviews the logs and is surprised that the scan was not flagged. What allowed the scan to complete without triggering alerts?

Options:

A.

It used TCP ACK packets that were allowed through.


B.

It used UDP packets that bypassed ICMP inspection.


C.

It scanned only the ports open in the firewall whitelist.


D.

It performed an ICMP Echo ping sweep without port probing.


Expert Solution
Questions # 103:

A penetration tester alters the "file" parameter in a web application (e.g., view?file=report.txt) to ../../../../etc/passwd and successfully accesses restricted system files. What attack method does this scenario illustrate?

Options:

A.

Conduct a brute-force attack to obtain administrative credentials


B.

Use directory traversal sequences in URL parameters to retrieve unauthorized system content


C.

Inject malicious scripts into web pages to manipulate content via XSS vulnerabilities


D.

Exploit buffer overflow issues by injecting oversized data in HTTP request headers


Expert Solution
Questions # 104:

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

Options:

A.

 Session hijacking


B.

 Firewalking


C.

 Man-in-the-middle attack


D.

 Network sniffing


Expert Solution
Questions # 105:

Which utility will tell you in real time which ports are listening or in another state?

Options:

A.

Netstat


B.

TCPView


C.

Nmap


D.

Loki


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 91-105 out of questions