Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions
Questions # 161:

E-mail scams and mail fraud are regulated by which of the following?

Options:

A.

18 U.S.C. §1030 – Fraud and Related Activity in Connection with Computers


B.

18 U.S.C. §1029 – Fraud and Related Activity in Connection with Access Devices


C.

18 U.S.C. §1362 – Communication Lines, Stations, or Systems


D.

18 U.S.C. §2510 – Wire and Electronic Communications Interception and Interception of Oral Communication


Expert Solution
Questions # 162:

A penetration tester is running a vulnerability scan on a company’s network. The scan identifies an open port with a high-severity vulnerability linked to outdated software. What is the most appropriate next step for the tester?

Options:

A.

Execute a denial-of-service (DoS) attack on the open port


B.

Perform a brute-force attack on the service running on the open port


C.

Research the vulnerability and determine if it has a publicly available exploit


D.

Ignore the vulnerability and focus on finding more vulnerabilities


Expert Solution
Questions # 163:

An organization uses SHA-256 for data integrity verification but still experiences unauthorized data modification. Which cryptographic tool would best resolve this issue?

Options:

A.

Asymmetric encryption


B.

Symmetric encryption


C.

SSL/TLS certificates


D.

Digital signatures


Expert Solution
Questions # 164:

An Android device has an unpatched permission-handling flaw and updated antivirus. What is the most effective undetected exploitation approach?

Options:

A.

SMS phishing


B.

Rootkit installation


C.

Custom exploit with obfuscation


D.

Metasploit payload


Expert Solution
Questions # 165:

While assessing a web server, a tester sends malformed HTTP requests and compares responses to identify the server type and version. What technique is being employed?

Options:

A.

Fingerprinting server identity using banner-grabbing techniques


B.

Sending phishing emails to extract web server login credentials


C.

Conducting session fixation using malformed cookie headers


D.

Injecting scripts into headers for persistent XSS attacks


Expert Solution
Questions # 166:

In ethical hacking, what is black box testing?

Options:

A.

Testing using only publicly available information


B.

Testing without any prior knowledge of the system


C.

Testing with full system knowledge


D.

Testing knowing only inputs and outputs


Expert Solution
Questions # 167:

A system administrator observes that several machines in the network are repeatedly sending out traffic to unknown IP addresses. Upon inspection, these machines were part of a coordinated spam campaign. What is the most probable cause?

Options:

A.

Keyloggers were harvesting user credentials


B.

Devices were enslaved into a botnet network


C.

Browsers were redirected to adware-injected sites


D.

Worms exploited zero-day vulnerabilities


Expert Solution
Questions # 168:

Using nbtstat -A , NetBIOS names including <20> and <03> are retrieved, but shared folders cannot be listed. Why?

Options:

A.

File and printer sharing is disabled


B.

NetBIOS runs on a non-standard port


C.

nbtstat cannot enumerate shared folders


D.

The host is not in an AD domain


Expert Solution
Questions # 169:

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.

Which AAA protocol is the most likely able to handle this requirement?

Options:

A.

TACACS+


B.

DIAMETER


C.

Kerberos


D.

RADIUS


Expert Solution
Questions # 170:

A serverless application was compromised through an insecure third-party API used by a function. What is the most effective countermeasure?

Options:

A.

Deploy a cloud-native security platform


B.

Enforce function-level least privilege permissions


C.

Use a CASB for third-party services


D.

Regularly update serverless functions


Expert Solution
Questions # 171:

Sam, a professional hacker. targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS 1AM credentials and further compromise the employee's account. What is the technique used by Sam to compromise the AWS IAM credentials?

Options:

A.

Social engineering


B.

insider threat


C.

Password reuse


D.

Reverse engineering


Expert Solution
Questions # 172:

A penetration tester is tasked with assessing the security of an Android mobile application that stores sensitive user data. The tester finds that the application does not use proper encryption to secure data at rest. What is the most effective way to exploit this vulnerability?

Options:

A.

Access the local storage to retrieve sensitive data directly from the device


B.

Use SQL injection to retrieve sensitive data from the backend server


C.

Execute a Cross-Site Scripting (XSS) attack to steal session cookies


D.

Perform a brute-force attack on the application's login credentials


Expert Solution
Questions # 173:

While testing a web application in development, you notice that the web server does not properly ignore the “dot dot slash” (../) character string and instead returns the file listing of a folder structure of the server.

What kind of attack is possible in this scenario?

Options:

A.

Cross-site scripting


B.

Denial of service


C.

SQL injection


D.

Directory traversal


Expert Solution
Questions # 174:

Which definition among those given below best describes a covert channel?

Options:

A.

A server program using a port that is not well known.


B.

Making use of a protocol in a way it is not intended to be used.


C.

It is the multiplexing taking place on a communication link.


D.

It is one of the weak channels used by WEP which makes it insecure


Expert Solution
Questions # 175:

Infected systems receive external instructions over HTTP and DNS, with fileless payloads modifying system components. What is the most effective action to detect and disrupt this malware?

Options:

A.

Update antivirus signatures regularly


B.

Allow only encrypted traffic via proxies


C.

Block common malware ports


D.

Use behavioral analytics to monitor abnormal outbound behavior


Expert Solution
Questions # 176:

What piece of hardware on a computer's motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?

Options:

A.

CPU


B.

GPU


C.

UEFI


D.

TPM


Expert Solution
Questions # 177:

Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to test the randomness of session tokens. Which of the following tools is used by Gregory in the above scenario?

Options:

A.

Nmap


B.

Burp Suite


C.

CxSAST


D.

Wireshark


Expert Solution
Questions # 178:

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this. James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?

Options:

A.

ophcrack


B.

Hootsuite


C.

VisualRoute


D.

HULK


Expert Solution
Questions # 179:

Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords.

Which of the following tools would not be useful for cracking the hashed passwords?

Options:

A.

John the Ripper


B.

Hashcat


C.

netcat


D.

THC-Hydra


Expert Solution
Questions # 180:

Which rootkit is characterized by its function of adding code and/or replacing some of the operating-system kernel code to obscure a backdoor on a system?

Options:

A.

User-mode rootkit


B.

Library-level rootkit


C.

Kernel-level rootkit


D.

Hypervisor-level rootkit


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions