Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-50v13 Practice Exam with Questions & Answers | Set: 10

Questions 136

Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company. What is the API vulnerability revealed in the above scenario?

Options:
A.

Code injections

B.

Improper use of CORS

C.

No ABAC validation

D.

Business logic flaws

ECCouncil 312-50v13 Premium Access
Questions 137

Which of the following describes the characteristics of a Boot Sector Virus?

Options:
A.

Modifies directory table entries so that directory entries point to the virus code instead of the actual program.

B.

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.

C.

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.

D.

Overwrites the original MBR and only executes the new virus code.

Questions 138

in the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in?

Options:
A.

3.0-6.9

B.

40-6.0

C.

4.0-6.9

D.

3.9-6.9

Questions 139

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems, and intrusion detection/prevention tools in your company's network. You are confident that hackers will never be able to gain access. Your peer, Peter Smith, disagrees and says the presence of a “weakest link” still exposes the network.

What is Peter Smith talking about?

Options:
A.

Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain

B.

"Zero-day" exploits are the weakest link in the security chain since IDS will not be able to detect these attacks

C.

"Polymorphic viruses" are the weakest link in the security chain since antivirus scanners will not be able to detect these attacks

D.

Continuous spam emails cannot be blocked by your security system since spammers use different techniques to bypass filters

Questions 140

What piece of hardware on a computer's motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?

Options:
A.

CPU

B.

GPU

C.

UEFI

D.

TPM

Questions 141

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

Options:
A.

Overloading Port Address Translation

B.

Dynamic Port Address Translation

C.

Dynamic Network Address Translation

D.

Static Network Address Translation

Questions 142

Password cracking programs reverse the hashing process to recover passwords. (True/False.)

Options:
A.

True

B.

False

Questions 143

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?

Options:
A.

Scanning

B.

Footprinting

C.

Enumeration

D.

System Hacking

Questions 144

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?

Options:
A.

OPPORTUNISTICTLS

B.

UPGRADETLS

C.

FORCETLS

D.

STARTTLS

Questions 145

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on Don in the above scenario?

Options:
A.

SMS phishing attack

B.

SIM card attack

C.

Agent Smith attack

D.

Clickjacking

Questions 146

jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

Options:
A.

Wireless sniffing

B.

Piggybacking

C.

Evil twin

D.

Wardriving

Questions 147

This kind of password cracking method uses word lists in combination with numbers and special characters:

Options:
A.

Hybrid

B.

Linear

C.

Symmetric

D.

Brute Force

Questions 148

Which tool can be used to silently copy files from USB devices?

Options:
A.

USB Grabber

B.

USB Snoopy

C.

USB Sniffer

D.

USB Dumper

Questions 149

While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to determine whether the firewall is stateful or stateless, which of the following options would be best to use?

Options:
A.

-sA

B.

-sX

C.

-sT

D.

-sF

Questions 150

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

Options:
A.

Copy the system files from a known good system

B.

Perform a trap and trace

C.

Delete the files and try to determine the source

D.

Reload from a previous backup

E.

Reload from known good media