Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-50v13 Practice Exam with Questions & Answers | Set: 10

Questions 181

Why is a penetration test considered to be more thorough than a vulnerability scan?

Options:
A.

Vulnerability scans only do host discovery and port scanning by default.

B.

A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.

C.

It is not – a penetration test is often performed by an automated tool, while a vulnerability scan requires active engagement.

D.

The tools used by penetration testers tend to have much more comprehensive vulnerability databases.

ECCouncil 312-50v13 Premium Access
Questions 182

Ethical backer jane Doe is attempting to crack the password of the head of the it department of ABC company. She Is utilizing a rainbow table and notices upon entering a password that extra characters are added to the password after submitting. What countermeasure is the company using to protect against rainbow tables?

Options:
A.

Password key hashing

B.

Password salting

C.

Password hashing

D.

Account lockout

Questions 183

Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?

Options:
A.

getsystem

B.

getuid

C.

keylogrecorder

D.

autoroute

Questions 184

You receive an email prompting you to download “Antivirus 2010” software using a suspicious link. The software claims to provide protection but redirects you to an unknown site.

How will you determine if this is a Real or Fake Antivirus website?

Options:
A.

Look at the website design, if it looks professional then it is a Real Antivirus website

B.

Connect to the site using SSL, if you are successful then the website is genuine

C.

Search using the URL and Antivirus product name into Google and look out for suspicious warnings against this site

D.

Download and install Antivirus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

E.

Same as D (duplicated)

Questions 185

George, an employee of an organization, is attempting to access restricted websites from an official computer. For this purpose, he used an anonymizer that masked his real IP address and ensured complete and continuous anonymity for all his online activities. Which of the following anonymizers helps George hide his activities?

Options:
A.

https://www.baidu.com

B.

https://www.guardster.com

C.

https://www.wolframalpha.com

D.

https://karmadecay.com

Questions 186

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.

Options:
A.

Bryan’s public key; Bryan’s public key

B.

Alice’s public key; Alice’s public key

C.

Bryan’s private key; Alice’s public key

D.

Bryan’s public key; Alice’s public key

Questions 187

What is the most common method to exploit the “Bash Bug” or “Shellshock” vulnerability?

Options:
A.

SYN Flood

B.

SSH

C.

Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server

D.

Manipulate format strings in text fields

Questions 188

Which indicator most strongly confirms a MAC flooding attack?

Options:
A.

Multiple IPs to one MAC

B.

Multiple MACs to one IP

C.

Numerous MAC addresses on a single switch port

D.

Increased ARP requests

Questions 189

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

Options:
A.

All three servers need to be placed internally

B.

A web server facing the Internet, an application server on the internal network, a database server on the internal network

C.

A web server and the database server facing the Internet, an application server on the internal network

D.

All three servers need to face the Internet so that they can communicate between themselves

Questions 190

While assessing a web server, a tester sends malformed HTTP requests and compares responses to identify the server type and version. What technique is being employed?

Options:
A.

Fingerprinting server identity using banner-grabbing techniques

B.

Sending phishing emails to extract web server login credentials

C.

Conducting session fixation using malformed cookie headers

D.

Injecting scripts into headers for persistent XSS attacks

Questions 191

Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture Is Abel currently working in?

Options:
A.

Tier-1: Developer machines

B.

Tier-4: Orchestrators

C.

Tier-3: Registries

D.

Tier-2: Testing and accreditation systems

Questions 192

During testing against a network protected by a signature-based IDS, the tester notices that standard scans are blocked. To evade detection, the tester sends TCP headers split into multiple small IP fragments so the IDS cannot reassemble or interpret them, but the destination host can. What technique is being used?

Options:
A.

IP decoying with randomized address positions

B.

SYN scan with spoofed MAC address

C.

Packet crafting with randomized window size

D.

Packet fragmentation to bypass filtering logic

Questions 193

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?

Options:
A.

Key derivation function

B.

Key reinstallation

C.

A Public key infrastructure

D.

Key stretching

Questions 194

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?

Options:
A.

OPPORTUNISTICTLS

B.

UPGRADETLS

C.

FORCETLS

D.

STARTTLS

Questions 195

What is the correct order of the five phases of ethical hacking?

Options:
A.

Gaining Access → Maintaining Access → Covering Tracks → Reconnaissance → Scanning

B.

Maintaining Access → Covering Tracks → Reconnaissance → Scanning → Gaining Access

C.

Reconnaissance → Scanning → Gaining Access → Maintaining Access → Covering Tracks

D.

Scanning → Reconnaissance → Gaining Access → Covering Tracks → Maintaining Access

Questions 196

As a newly appointed network security analyst, you are tasked with ensuring that the organization’s network can detect and prevent evasion techniques used by attackers. One commonly used evasion technique is packet fragmentation, which is designed to bypass intrusion detection systems (IDS). Which IDS configuration should be implemented to effectively counter this technique?

Options:
A.

Implementing an anomaly-based IDS that can detect irregular traffic patterns caused by packet fragmentation.

B.

Adjusting the IDS to recognize regular intervals at which fragmented packets are sent.

C.

Configuring the IDS to reject all fragmented packets to eliminate the risk.

D.

Employing a signature-based IDS that recognizes the specific signature of fragmented packets.

Questions 197

What is the most plausible attack vector an APT group would use to compromise an IoT-based environmental control system?

Options:
A.

Exploiting zero-day firmware vulnerabilities

B.

Using stolen user credentials

C.

Encrypted MitM attack

D.

DDoS attack

Questions 198

which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

Options:
A.

Bluesmacking

B.

Bluebugging

C.

Bluejacking

D.

Bluesnarfing

Questions 199

You are an ethical hacker tasked with conducting an enumeration of a company’s network. Given a Windows system with NetBIOS enabled, port 139 open, and file and printer sharing active, you are about to run some nbtstat commands to enumerate NetBIOS names. The company uses |Pv6 for its network. Which of the

following actions should you take next?

Options:
A.

Use nbtstat -c to get the contents of the NetBIOS name cache

B.

use nbtstat -a followed by the IPv6 address of the target machine

C.

Utilize Nmap Scripting Engine (NSE) for NetBIOS enumeration

D.

Switch to an enumeration tool that supports IPv6

Questions 200

Which among the following is the best example of the hacking concept called "clearing tracks"?

Options:
A.

After a system is breached, a hacker creates a backdoor to allow re-entry into a system.

B.

During a cyberattack, a hacker injects a rootkit into a server.

C.

An attacker gains access to a server through an exploitable vulnerability.

D.

During a cyberattack, a hacker corrupts the event logs on all machines.