New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 121-135 out of questions
Questions # 121:

You are an ethical hacker tasked with conducting an enumeration of a company’s network. Given a Windows system with NetBIOS enabled, port 139 open, and file and printer sharing active, you are about to run some nbtstat commands to enumerate NetBIOS names. The company uses |Pv6 for its network. Which of the

following actions should you take next?

Options:

A.

Use nbtstat -c to get the contents of the NetBIOS name cache


B.

use nbtstat -a followed by the IPv6 address of the target machine


C.

Utilize Nmap Scripting Engine (NSE) for NetBIOS enumeration


D.

Switch to an enumeration tool that supports IPv6


Expert Solution
Questions # 122:

Which of the following is a passive wireless packet analyzer that works on Linux-based systems?

Options:

A.

Burp Suite


B.

OpenVAS


C.

tshark


D.

Kismet


Expert Solution
Questions # 123:

Which of the following tools can be used for passive OS fingerprinting?

Options:

A.

nmap


B.

tcpdump


C.

tracert


D.

ping


Expert Solution
Questions # 124:

How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?

Options:

A.

Hash value


B.

Private key


C.

Digital signature


D.

Digital certificate


Expert Solution
Questions # 125:

A penetration tester is evaluating a secure web application that uses HTTPS, secure cookie flags, and regenerates session IDs only during specific user actions. To hijack a legitimate user's session without triggering security alerts, which advanced session hijacking technique should the tester employ?

Options:

A.

Perform a man-in-the-middle attack by exploiting certificate vulnerabilities


B.

Use a session fixation attack by setting a known session ID before the user logs in


C.

Conduct a session token prediction attack by analyzing session ID patterns


D.

Implement a Cross-Site Scripting (XSS) attack to steal session tokens


Expert Solution
Questions # 126:

Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability. He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to. What type of hacker is Nicolas?

Options:

A.

Red hat


B.

white hat


C.

Black hat


D.

Gray hat


Expert Solution
Questions # 127:

_________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information.

Options:

A.

Spear phishing


B.

Whaling


C.

Vishing


D.

Phishing


Expert Solution
Questions # 128:

Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com. the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different. What type of attack he is experiencing?.

Options:

A.

Dos attack


B.

DHCP spoofing


C.

ARP cache poisoning


D.

DNS hijacking


Expert Solution
Questions # 129:

What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

Options:

A.

Man-in-the-middle attack


B.

Meet-in-the-middle attack


C.

Replay attack


D.

Traffic analysis attack


Expert Solution
Questions # 130:

You are the lead cybersecurity analyst at a multinational corporation that uses a hybrid encryption system to secure inter-departmental communications. The system uses RSA encryption for key exchange and AES for data encryption, taking advantage of the strengths of both asymmetric and symmetric encryption. Each RSA

key pair has a size of 'n' bits, with larger keys providing more security at the cost of slower performance. The time complexity of generating an RSA key pair is O(n*2), and AES encryption has a time complexity of O(n). An attacker has developed a quantum algorithm with time complexity O((log n)*2) to crack RSA encryption. Given *n=4000' and variable ‘AES key size’, which scenario is likely to provide the best balance of security and

performance?

Options:

A.

AES key size=128 bits: This configuration provides less security than option A, but RSA key generation and AES encryption will be faster.


B.

AES key size=256 bits: This configuration provides a high level of security, but RSA key generation may be slow.


C.

AES key size=192 bits: This configuration is a balance between options A and B, providing moderate security and performance.


D.

AES key size=512 bits: This configuration provides the highest level of security but at a significant performance cost due to the large AES key size.


Expert Solution
Questions # 131:

Which Nmap switch helps evade IDS or firewalls?

Options:

A.

-n/-R


B.

-0N/-0X/-0G


C.

-T


D.

-D


Expert Solution
Questions # 132:

A penetration tester targets a WPA2-PSK wireless network. The tester captures the handshake and wants to speed up cracking the pre-shared key. Which approach is most effective?

Options:

A.

Conduct a Cross-Site Scripting (XSS) attack on the router's login page


B.

Use a brute-force attack to crack the pre-shared key manually


C.

Use a dictionary attack with a large wordlist to crack the WPA2 key


D.

Perform a SQL injection attack to bypass the WPA2 authentication


Expert Solution
Questions # 133:

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host

10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he

applied his ACL configuration in the router, nobody can access the ftp, and the permitted hosts cannot access

the Internet. According to the next configuration, what is happening in the network?

access-list 102 deny tcp any any

access-list 104 permit udp host 10.0.0.3 any

access-list 110 permit tcp host 10.0.0.2 eq www any

access-list 108 permit tcp any eq ftp any

Options:

A.

The ACL 104 needs to be first because is UDP


B.

The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router


C.

The ACL for FTP must be before the ACL 110


D.

The ACL 110 needs to be changed to port 80


Expert Solution
Questions # 134:

Which of the following are well-known password-cracking programs?

Options:

A.

L0phtcrack


B.

NetCat


C.

Jack the Ripper


D.

Netbus


E.

John the Ripper


Expert Solution
Questions # 135:

BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from Active Directory.

What is this mechanism called in cryptography?

Options:

A.

Key archival


B.

Key escrow


C.

Certificate rollover


D.

Key renewal


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 121-135 out of questions