Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 141-160 out of questions
Questions # 141:

Malware adapts behavior, changes code dynamically, and exfiltrates data stealthily. What is it?

Options:

A.

AI-powered malware


B.

Worm


C.

Rootkit


D.

Polymorphic virus


Expert Solution
Questions # 142:

While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences. He then decided to conduct: nmap -Pn -p- -si kiosk.adobe.com www.riaa.com. kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using "-si" with Nmap?

Options:

A.

Conduct stealth scan


B.

Conduct ICMP scan


C.

Conduct IDLE scan


D.

Conduct silent scan


Expert Solution
Questions # 143:

A financial institution's online banking platform is experiencing intermittent downtime caused by a sophisticated DDoS attack that combines SYN floods and HTTP GET floods from a distributed botnet. Standard firewalls and load balancers cannot mitigate the attack without affecting legitimate users. To protect their infrastructure and maintain service availability, which advanced mitigation strategy should the institution implement?

Options:

A.

Configure firewalls to block all incoming SYN and HTTP requests from external IPs


B.

Increase server bandwidth and apply basic rate limiting on incoming traffic


C.

Deploy an Intrusion Prevention System (IPS) with deep packet inspection capabilities


D.

Utilize a cloud-based DDoS protection service that offers multi-layer traffic scrubbing and auto-scaling


Expert Solution
Questions # 144:

You perform a network scan using ICMP Echo Requests and observe that certain IP addresses do not return Echo Replies, while other network services remain functional. How should this situation be interpreted?

Options:

A.

The scanned IPs are unused and available for expansion


B.

The lack of replies indicates a major breach


C.

A firewall or security control is blocking ICMP Echo Requests


D.

The non-responsive IPs indicate severe congestion


Expert Solution
Questions # 145:

The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept.

What is the Wi-Fi encryption technology implemented by Debry Inc.?

Options:

A.

WEP


B.

WPA


C.

WPA2


D.

WPA3


Expert Solution
Questions # 146:

A penetration tester must enumerate user accounts and network resources in a highly secured Windows environment where SMB null sessions are blocked. Which technique should be used to gather this information discreetly?

Options:

A.

Utilize NetBIOS over TCP/IP to list shared resources anonymously


B.

Exploit a misconfigured LDAP service to perform anonymous searches


C.

Leverage Active Directory Web Services for unauthorized queries


D.

Conduct a zone transfer by querying the organization’s DNS servers


Expert Solution
Questions # 147:

Which algorithm best protects encrypted traffic patterns?

Options:

A.

PSA


B.

AES


C.

DES


D.

HMAC


Expert Solution
Questions # 148:

Cyber experts conducting covert missions exclusively for national interests are best classified as:

Options:

A.

State-sponsored hackers


B.

Organized hackers


C.

Gray hat hackers


D.

Hacktivists


Expert Solution
Questions # 149:

During a red team assessment, an ethical hacker must map a large multinational enterprise’s external attack surface. Due to strict rules of engagement, no active scans may be used. The goal is to identify publicly visible subdomains to uncover forgotten or misconfigured services. Which method should the ethical hacker use to passively enumerate the organization’s subdomains?

Options:

A.

Leverage tools like Netcraft or DNSdumpster to gather subdomain information


B.

Attempt to guess admin credentials and access the company’s DNS portal


C.

Conduct a brute-force DNS subdomain enumeration


D.

Request internal DNS records using spoofed credentials


Expert Solution
Questions # 150:

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?

Options:

A.

Exploration


B.

Investigation


C.

Reconnaissance


D.

Enumeration


Expert Solution
Questions # 151:

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.

What term is commonly used when referring to this type of testing?

Options:

A.

Randomizing


B.

Bounding


C.

Mutating


D.

Fuzzing


Expert Solution
Questions # 152:

A cyber attacker has initiated a series of activities against a high-profile organization following the Cyber Kill

Chain Methodology. The attacker is presently in the “Delivery” stage. As an Ethical Hacker, you are trying to

anticipate the adversary's next move. What is the most probable subsequent action from the attacker based on

the Cyber Kill Chain Methodology?

Options:

A.

The attacker will attempt to escalate privileges to gain complete control of the compromised system.


B.

The attacker will exploit the malicious payload delivered to the target organization and establish a foothold.


C.

The attacker will initiate an active connection to the target system to gather more data.


D.

The attacker will start reconnaissance to gather as much information as possible about the target.


Expert Solution
Questions # 153:

Self-replicating malware causes redundant traffic, crashes, and spreads autonomously. What malware type is responsible, and how should it be handled?

Options:

A.

Worm – isolate systems, scan network, update OS


B.

Ransomware – disconnect, back up data, decrypt


C.

Trojan – scan systems and patch


D.

Rootkit – reboot and deploy scanner


Expert Solution
Questions # 154:

You are trying to break into a highly secure mainframe system at a bank. Conventional hacking doesn't work because of strong technical defenses. You aim to exploit the human element instead.

How would you proceed?

Options:

A.

Look for zero-day exploits at underground hacker websites and buy them


B.

Try to hang around local pubs or restaurants near the bank, get talking to a disgruntled employee, and offer them money for sensitive access


C.

Launch a DDoS attack using thousands of zombies


D.

Conduct a Man-in-the-Middle (MiTM) attack using DNS cache poisoning


Expert Solution
Questions # 155:

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

Options:

A.

Symmetric algorithms


B.

Asymmetric algorithms


C.

Hashing algorithms


D.

Integrity algorithms


Expert Solution
Questions # 156:

An attacker exploits medical imaging protocols to intercept patient data. Which sniffing technique is most challenging?

Options:

A.

MRI firmware interception


B.

Ultrasound malware


C.

Covert channel within administrative messages


D.

Embedding data inside CT scan images


Expert Solution
Questions # 157:

In a vertical privilege escalation scenario, the attacker attempts to gain access to a user account with higher privileges than their current level. Which of the following examples describes vertical privilege escalation?

Options:

A.

An attacker exploits weak access controls to access and steal sensitive information from another user's account with alike privileges.


B.

An attacker leverages a lack of session management controls to switch accounts and access resources assigned to another user with the same permissions.


C.

An attacker uses an unquoted service path vulnerability to gain unauthorized access to another user's data with equivalent privileges.


D.

An attacker escalates from a regular user to an administrator by exploiting administrative functions.


Expert Solution
Questions # 158:

This TCP flag instructs the sending system to transmit all buffered data immediately.

Options:

A.

SYN


B.

RST


C.

PSH


D.

URG


E.

FIN


Expert Solution
Questions # 159:

Which of the following tools can be used to perform a zone transfer?

Options:

A.

NSLookup


B.

Finger


C.

Dig


D.

Sam Spade


E.

Host


F.

Netcat


G.

Neotrace


Expert Solution
Questions # 160:

In your role as a cybersecurity analyst at a large e-commerce company, you have been tasked with reinforcing the firm’s defenses against potential Denial-of-Service (DoS) attacks. During a recent review, you noticed several IP addresses generating excessive traffic, causing an unusually high server load. Inspection of packets revealed that the TCP three-way handshake was never completed, leaving multiple connections in a SYN_RECEIVED state. The intent appears to be saturating server resources without completing connections. Which type of DoS attack is most likely being executed?

Options:

A.

SYN Flood


B.

Smurf Attack


C.

Ping of Death


D.

UDP Flood


Expert Solution
Viewing page 8 out of 14 pages
Viewing questions 141-160 out of questions