Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions
Questions # 121:

During a physical penetration test simulating a social engineering attack, a threat actor walks into the lobby of a target organization dressed as a field technician from a known external vendor. Carrying a fake ID badge and referencing a known company name, the attacker confidently claims they’ve been dispatched to perform a routine server room upgrade. Using internal-sounding terminology and referencing real employee names gathered via OSINT, the individual conveys urgency. The receptionist, recognizing the vendor name and the convincing language, allows access without verifying the credentials.

Options:

A.

Perceived authority and reliance on third-party familiarity


B.

Leaked credentials on public networks and forums


C.

Trust in physical security logs used by security teams


D.

Misconfigured network segmentation allowing unauthorized access


Expert Solution
Questions # 122:

An AWS security operations team receives an alert regarding abnormal outbound traffic from an EC2 instance. The instance begins transmitting encrypted data packets to an external domain that resolves to a Dropbox account not associated with the organization. Further analysis reveals that a malicious executable silently modified the Dropbox sync configuration to use the attacker ' s access token, allowing automatic synchronization of internal files to the attacker’s cloud storage. What type of attack has likely occurred?

Options:

A.

Cloud Snooper attack leveraging port masquerading


B.

Man-in-the-Cloud (MITC) attack


C.

Side-channel attack exploiting CPU cache


D.

Cryptojacking using Coin Hive scripts


Expert Solution
Questions # 123:

A penetration tester gains access to a target system through a vulnerability in a third-party software application. What is the most effective next step to take to gain full control over the system?

Options:

A.

Conduct a denial-of-service (DoS) attack to disrupt the system’s services


B.

Execute a Cross-Site Request Forgery (CSRF) attack to steal session data


C.

Perform a brute-force attack on the system ' s root password


D.

Use a privilege escalation exploit to gain administrative privileges on the system


Expert Solution
Questions # 124:

During a stealth penetration test at a defense research facility, ethical hacker Daniel installs a payload that survives even after multiple operating system reinstalls. The implant resides deep inside the system hardware and executes before the OS is loaded, ensuring that forensic scans and antivirus tools at the OS level cannot detect or remove it. Administrators notice unusual activity on network cards and storage devices, but repeated scans show no malware traces within the file system.

Which type of rootkit most likely enabled this level of persistence?

Options:

A.

Boot-Loader-Level Rootkit


B.

Hypervisor-Level Rootkit


C.

Kernel-Level Rootkit


D.

Hardware/Firmware Rootkit


Expert Solution
Questions # 125:

A penetration tester performs a vulnerability scan on a company’s web server and identifies several medium-risk vulnerabilities related to misconfigured settings. What should the tester do to verify the vulnerabilities?

Options:

A.

Use publicly available tools to exploit the vulnerabilities and confirm their impact


B.

Ignore the vulnerabilities since they are medium-risk


C.

Perform a brute-force attack on the web server ' s login page


D.

Conduct a denial-of-service (DoS) attack to test the server ' s resilience


Expert Solution
Questions # 126:

During a red team engagement at a manufacturing company in Dallas, penetration tester Tyler gains access to a Windows workstation. Later in the exercise, he reviews his exfiltrated logs and finds detailed records of employee logins, email drafts, and sensitive data entered into desktop applications. The collection occurred without requiring browser injection or physical device access, and no kernel drivers were installed.

Which type of keylogger did Tyler most likely deploy?

Options:

A.

JavaScript Keylogger


B.

Hardware Keylogger


C.

Kernel Keylogger


D.

Application Keylogger


Expert Solution
Questions # 127:

A penetration tester evaluates a company ' s secure web application, which uses HTTPS, secure cookie flags, and strict session management to prevent session hijacking. To bypass these protections and hijack a legitimate user ' s session without detection, which advanced technique should the tester employ?

Options:

A.

Utilize a session fixation attack by forcing a known session ID during login


B.

Perform a Cross-Site Scripting (XSS) attack to steal the session token


C.

Exploit a timing side-channel vulnerability to predict session tokens


D.

Implement a Man-in-the-Middle (MitM) attack by compromising a trusted certificate authority


Expert Solution
Questions # 128:

Which social engineering attack involves impersonating a co-worker or authority figure to extract confidential information?

Options:

A.

Phishing


B.

Pretexting


C.

Quid pro quo


D.

Baiting


Expert Solution
Questions # 129:

During a penetration test for a global e-commerce platform in Dallas, ethical hacker Maria simulates a large-scale DoS campaign. Instead of sending attack traffic directly, she forges requests to multiple open services across the internet. These services unknowingly reply to the victim system, multiplying the amount of traffic hitting the target. Within minutes, the victim ' s server is overwhelmed by a flood of responses, even though Maria ' s own machine generated only a small amount of traffic.

Which attack technique is Maria most likely demonstrating?

Options:

A.

Smurf Attack


B.

Distributed Reflection Denial-of-Service (DRDoS)


C.

Botnet


D.

NTP Amplification Attack


Expert Solution
Questions # 130:

During a routine security audit, administrators found that cloud storage backups were illegally accessed and modified. What countermeasure would most directly mitigate such incidents in the future?

Options:

A.

Deploying biometric entry systems


B.

Implementing resource auto-scaling


C.

Regularly conducting SQL injection testing


D.

Adopting the 3-2-1 backup model


Expert Solution
Questions # 131:

Justin Fletcher is conducting an authorized assessment for EverSafe Technologies in Las Vegas. During the active reconnaissance phase, he interacts directly with the organization ' s infrastructure to retrieve structural details about how its public-facing systems are logically organized. His activity generates entries within the target environment ' s monitoring systems. Which type of active footprinting technique is Justin performing?

Options:

A.

Network/port scanning


B.

DNS interrogation


C.

Social engineering


D.

User and service enumeration


Expert Solution
Questions # 132:

You are an ethical hacker at Sentinel Cyberworks, engaged to assess the wireless defenses of HarborTrust Bank in Portland, Oregon. During your assessment, the security team shows you a production system that continuously places selected APs into a passive scan mode, aggregates alarms from multiple wireless controllers into a central engine for forensic storage, and can automatically apply countermeasures (for example, time-sliced channel scanning and remote configuration changes) across the campus when it classifies a nearby device as malicious. Based on the described capabilities, which Wi-Fi security solution is this most consistent with?

Options:

A.

WatchGuard Wi-Fi Cloud WIPS


B.

RFProtect


C.

Fern WiFi Cracker


D.

Cisco Adaptive Wireless IPS


Expert Solution
Questions # 133:

A penetration tester is tasked with uncovering historical content from a company’s website, including previously exposed login portals or sensitive internal pages. Direct interaction with the live site is prohibited due to strict monitoring policies. To stay undetected, the tester decides to explore previously indexed snapshots of the organization’s web content saved by external sources. Which approach would most effectively support this passive information-gathering objective?

Options:

A.

Search with intext: " login " site:target.com to retrieve login data


B.

Use the link: operator to find backlinks to login portals


C.

Apply the cache: operator to view Google ' s stored versions of target pages


D.

Use the intitle:login operator to list current login pages


Expert Solution
Questions # 134:

A future-focused security audit discusses risks where attackers collect encrypted data today, anticipating they will be able to decrypt it later using quantum computers. What is this threat commonly known as?

Options:

A.

Saving data today for future quantum decryption


B.

Breaking RSA using quantum algorithms


C.

Flipping qubit values to corrupt output


D.

Replaying intercepted quantum messages


Expert Solution
Questions # 135:

During a social engineering simulation at BrightPath Consulting in Denver, ethical hacker Liam emails employees a message that appears to come from the company’s security team. The email urgently warns that “all systems will shut down within 24 hours” unless staff download a patch from a provided link. The message is deliberately false and contains no actual malware, but it causes confusion and prompts several employees to call IT for clarification.

Which social engineering technique is Liam demonstrating?


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions