Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
Questions # 106:

In Denver, Colorado, ethical hacker Rachel Nguyen is conducting a network security assessment for Apex Logistics, a transportation firm with a complex internal network. During her test, Rachel observes a client-server communication and injects specially crafted packets into the exchange, disrupting the client’s session. As a result, the server continues interacting with Rachel’s system while the legitimate client’s connection becomes unresponsive. She uses this setup in a controlled environment to demonstrate vulnerabilities to the company’s IT team.

What network-level session hijacking technique is Rachel employing in this assessment?

Options:

A.

Blind hijacking


B.

UDP hijacking


C.

RST hijacking


D.

TCP/IP hijacking


Expert Solution
Questions # 107:

A cybersecurity consultant suspects attackers are attempting to evade an Intrusion Detection System (IDS). Which technique is most likely being used?

Options:

A.

Deploying self-replicating malware


B.

Fragmenting malicious packets into smaller segments


C.

Flooding the IDS with ICMP packets


D.

Sending phishing emails


Expert Solution
Questions # 108:

Which indicator most strongly confirms a MAC flooding attack?

Options:

A.

Multiple IPs to one MAC


B.

Multiple MACs to one IP


C.

Numerous MAC addresses on a single switch port


D.

Increased ARP requests


Expert Solution
Questions # 109:

A corporation migrates to a public cloud service, and the security team identifies a critical vulnerability in the cloud provider’s API. What is the most likely threat arising from this flaw?

Options:

A.

Distributed Denial-of-Service (DDoS) attacks on cloud servers


B.

Unauthorized access to cloud resources


C.

Physical security compromise of data centers


D.

Compromise of encrypted data at rest


Expert Solution
Questions # 110:

Who are “script kiddies” in the context of ethical hacking?

Options:

A.

Highly skilled hackers who write custom scripts


B.

Novices who use scripts developed by others


C.

Ethical hackers using scripts for penetration testing


D.

Hackers specializing in scripting languages


Expert Solution
Questions # 111:

A global fintech company receives extortion emails threatening a severe DDoS attack unless ransom is paid. The attacker briefly launches an HTTP flood to demonstrate capability. The attack uses incomplete POST requests that overload application-layer resources, causing performance degradation. The attacker reinforces their demand with a second threat email. What type of DDoS attack is being carried out?

Options:

A.

RDDoS attack combining threat and extortion


B.

DRDoS attack using intermediaries


C.

Recursive GET flood disguised as crawling


D.

Pulse wave attack with burst patterns


Expert Solution
Questions # 112:

During a penetration test at a regional bank in Richmond, ethical hacker Thomas is tasked with identifying weaknesses in how employee credentials are transmitted. He sets up Wireshark on a mirrored port and captures HTTP login sessions from the customer services VLAN. To quickly reconstruct entire conversations between browsers and the server, Thomas uses a feature that reassembles packet data into a readable stream, allowing him to view usernames and passwords directly in plain text.

Which Wireshark feature is Thomas most likely using in this case?

Options:

A.

Filtering by IP Address


B.

Display Filtering by Protocol


C.

Monitoring the Specific Ports


D.

Follow TCP Stream


Expert Solution
Questions # 113:

During a penetration test for a U.S.-based retail company, John gains access to a secondary server that responds unusually to structured queries. By sending a specially crafted request, he receives a full list of subdomains, MX records, and aliases belonging to the target organization. The response exposes sensitive internal mappings that could be leveraged for further attacks.

Which tool was MOST likely used to perform this enumeration?

Options:

A.

smtp-user-enum.pl -u user -t host


B.

ldapsearch -h -x


C.

nbtstat -A


D.

dig @server axfr


Expert Solution
Questions # 114:

Customer data in a cloud environment was exposed due to an unknown vulnerability. What is the most likely cause?

Options:

A.

Misconfigured security groups


B.

Brute force attack


C.

DoS attack


D.

Side-channel attack


Expert Solution
Questions # 115:

A penetration tester needs to identify open ports and services on a target network without triggering the organization ' s intrusion detection systems, which are configured to detect high-volume traffic and common scanning techniques. To achieve stealth, the tester decides to use a method that spreads out the scan over an extended period. Which scanning technique should the tester employ to minimize the risk of detection?

Options:

A.

Use a stealth scan by adjusting the scan timing options to be slow and random


B.

Perform a TCP SYN scan using a fast scan rate


C.

Execute a UDP scan targeting all ports simultaneously


D.

Conduct a TCP Xmas scan sending packets with all flags set


Expert Solution
Questions # 116:

A government agency trains a group of cybersecurity experts to carry out covert cyber missions against foreign threats and gather intelligence without being detected. These experts work exclusively for national interests. What classification best describes them?

Options:

A.

Organized hackers


B.

State-sponsored hackers


C.

Hacktivists


D.

Gray hat hackers


Expert Solution
Questions # 117:

A regional healthcare provider in Minneapolis, Minnesota began experiencing intermittent connectivity issues across a newly activated access-layer network segment. Shortly after a contractor connected a diagnostic device to an unused switch port, multiple employee workstations failed to receive valid network configurations. System logs showed repeated address negotiation attempts from affected hosts, while monitoring tools recorded a rapid sequence of configuration requests originating from a single switch interface. Within minutes, additional clients on the segment encountered similar assignment failures. From a sniffing standpoint, which technique most accurately explains this behavior?

Options:

A.

IRDP Spoofing


B.

DHCP Starvation


C.

Rogue DHCP Server


D.

MAC Spoofing


Expert Solution
Questions # 118:

During a penetration test at Sunshine Media ' s streaming platform in Miami, ethical hacker Sofia Alvarez examines whether the company ' s web server exposes sensitive resources through poor configuration. She finds that a crawler directive at the server ' s root allows unintended indexing of restricted areas. This oversight reveals internal paths that may expose hidden links, confidential files, or other sensitive information.

Which technique is Sofia most likely using in this assessment?

Options:

A.

Vulnerability Scanning


B.

Information Gathering from robots.txt File


C.

Web Server Footprinting/Banner Grabbing


D.

Directory Brute Forcing


Expert Solution
Questions # 119:

Fleet vehicles with smart locking systems were compromised after attackers captured unique signals from key fobs. What should the security team prioritize to confirm and prevent this attack?

Options:

A.

Secure firmware updates


B.

Increase physical surveillance


C.

Deploy anti-malware on smartphones


D.

Monitor wireless signals for jamming or interference


Expert Solution
Questions # 120:

In Seattle, Washington, ethical hacker Mia Chen is tasked with testing the network defenses of Pacific Shipping Co., a major logistics firm. During her penetration test, Mia targets the company ' s external-facing web server, which handles customer tracking requests. She observes that the security system filtering traffic to this server analyzes incoming SSH and DNS requests to block unauthorized access attempts. Mia plans to craft specific payloads to bypass this system to expose vulnerabilities to the IT department.

Which security system is Mia attempting to bypass during her penetration test of Pacific Shipping Co. ' s web server?

Options:

A.

Stateful Multilayer Inspection Firewall


B.

Application-Level Firewall


C.

Packet Filtering Firewall


D.

Circuit-Level Gateway Firewall


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions