New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 106-120 out of questions
Questions # 106:

An ethical hacker is scanning a target network. They initiate a TCP connection by sending an SYN packet to a target machine and receiving a SYN/ACK packet in response. But instead of completing the three-way handshake with an ACK packet, they send an RST packet. What kind of scan is the ethical hacker likely performing and what is their goal?

Options:

A.

They are performing an SYN scan to stealthily identify open ports without fully establishing a connection


B.

They are performing a TCP connect scan to identify open ports on the target machine


C.

They are performing a vulnerability scan to identify any weaknesses in the target system


D.

They are performing a network scan to identify live hosts and their IP addresses


Expert Solution
Questions # 107:

Being a Certified Ethical Hacker (CEH), a company has brought you on board to evaluate the safety measures in place for their network system. The company uses a network time protocol server in the demilitarized zone.

During your enumeration, you decide to run a ntptrace command. Given the syntax: ntptrace [-n] [-m maxhosts] [servername/IP_address], which command usage would best serve your objective to find where the NTP server obtains the time from and to trace the list of NTP servers connected to the network?

Options:

A.

ntptrace -m 5 192.168.1.1


B.

tptrace 192.1681.


C.

ntptrace -n localhost


D.

ntptrace -n -m 5 192.168.1.1


Expert Solution
Questions # 108:

What type of virus is most likely to remain undetected by antivirus software?

Options:

A.

Cavity virus


B.

Stealth virus


C.

File-extension virus


D.

Macro virus


Expert Solution
Questions # 109:

A penetration tester identifies that a web application's login form is not using secure password hashing mechanisms, allowing attackers to steal passwords if the database is compromised. What is the best approach to exploit this vulnerability?

Options:

A.

Perform a dictionary attack using a list of commonly used passwords against the stolen hash values


B.

Input a SQL query to check for SQL injection vulnerabilities in the login form


C.

Conduct a brute-force attack on the login form to guess weak passwords


D.

Capture the login request using a proxy tool and attempt to decrypt the passwords


Expert Solution
Questions # 110:

One of your team members has asked you to analyze the following SOA record. What is the version?

Rutgers.edu. SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) (Choose four.)

Options:

A.

200303028


B.

3600


C.

604800


D.

2400


E.

60


F.

4800


Expert Solution
Questions # 111:

A network security analyst, while conducting penetration testing, is aiming to identify a service account password using the Kerberos authentication protocol. They have a valid user authentication ticket (TGT) and decided to carry out a Kerberoasting attack. In the scenario described, which of the following steps should the analyst take next?

Options:

A.

Carry out a passive wire sniffing operation using Internet packet sniffers


B.

Extract plaintext passwords, hashes, PIN codes, and Kerberos tickets using a tool like Mimikatz


C.

Perform a PRobability INfinite Chained Elements (PRINCE) attack


D.

Request a service ticket for the service principal name of the target service account


Expert Solution
Questions # 112:

Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on jane?

Options:

A.

Dumpster diving


B.

Eavesdropping


C.

Shoulder surfing


D.

impersonation


Expert Solution
Questions # 113:

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch. In a MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports.

What happens when the CAM table becomes full?

Question # 113

Options:

A.

Switch then acts as hub by broadcasting packets to all machines on the network


B.

The CAM overflow table will cause the switch to crash causing Denial of Service


C.

The switch replaces outgoing frame switch factory default MAC address of FF:FF:FF:FF:FF:FF


D.

Every packet is dropped and the switch sends out SNMP alerts to the IDS port


Expert Solution
Questions # 114:

Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP inquiries over the network.

Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.

Options:

A.

SNMPUtil


B.

SNScan


C.

SNMPScan


D.

SolarWinds IP Network Browser


E.

NMap


Expert Solution
Questions # 115:

Becky has been hired by a client from Dubai to perform a penetration test against one of their remote offices. Working from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic information about their network. When analyzing the results of her Whois search, Becky notices that the IP was allocated to a location in Le Havre, France. Which regional Internet registry should Becky go to for detailed information?

Options:

A.

ARIN


B.

APNIC


C.

RIPE


D.

LACNIC


Expert Solution
Questions # 116:

Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture Is Abel currently working in?

Options:

A.

Tier-1: Developer machines


B.

Tier-4: Orchestrators


C.

Tier-3: Registries


D.

Tier-2: Testing and accreditation systems


Expert Solution
Questions # 117:

A penetration tester is running a vulnerability scan on a company’s network. The scan identifies an open port with a high-severity vulnerability linked to outdated software. What is the most appropriate next step for the tester?

Options:

A.

Execute a denial-of-service (DoS) attack on the open port


B.

Perform a brute-force attack on the service running on the open port


C.

Research the vulnerability and determine if it has a publicly available exploit


D.

Ignore the vulnerability and focus on finding more vulnerabilities


Expert Solution
Questions # 118:

Dorian Is sending a digitally signed email to Polly, with which key is Dorian signing this message and how is Poly validating It?

Options:

A.

Dorian is signing the message with his public key. and Poly will verify that the message came from Dorian by using Dorian's private key.


B.

Dorian Is signing the message with Polys public key. and Poly will verify that the message came from Dorian by using Dorian's public key.


C.

Dorian is signing the message with his private key. and Poly will verify that the message came from Dorian by using Dorian's public key.


D.

Dorian is signing the message with Polys private key. and Poly will verify mat the message came from Dorian by using Dorian's public key.


Expert Solution
Questions # 119:

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical Information to Johnson's machine. What is the social engineering technique Steve employed in the above scenario?

Options:

A.

Quid pro quo


B.

Diversion theft


C.

Elicitation


D.

Phishing


Expert Solution
Questions # 120:

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.

What is the port scanning technique used by Sam to discover open ports?

Options:

A.

Xmas scan


B.

IDLE/IPID header scan


C.

TCP Maimon scan


D.

ACK flag probe scan


Expert Solution
Viewing page 8 out of 14 pages
Viewing questions 106-120 out of questions