Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-50v13 Practice Exam with Questions & Answers | Set: 11

Questions 201

During a stealth assessment, an attacker exploits intermittent delays in ARP responses from a target system. By injecting fake ARP replies before legitimate ones, the attacker temporarily redirects traffic to their own device, allowing intermittent packet capture. What type of sniffing attack is occurring?

Options:
A.

Passive sniffing on a switched network

B.

Duplicate IP conflict resolution attack

C.

Switch port stealing via timing-based ARP spoofing

D.

ARP poisoning for MiTM interception

ECCouncil 312-50v13 Premium Access
Questions 202

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

Options:
A.

Residual risk

B.

Impact risk

C.

Deferred risk

D.

Inherent risk

Questions 203

In the process of implementing a network vulnerability assessment strategy for a tech company, the security

analyst is confronted with the following scenarios:

1) A legacy application is discovered on the network, which no longer receives updates from the vendor.

2) Several systems in the network are found running outdated versions of web browsers prone to distributed

attacks.

3) The network firewall has been configured using default settings and passwords.

4) Certain TCP/IP protocols used in the organization are inherently insecure.

The security analyst decides to use vulnerability scanning software. Which of the following limitations of vulnerability assessment should the analyst be most cautious about in this context?

Options:
A.

Vulnerability scanning software is limited in its ability to perform live tests on web applications to detect errors or unexpected behavior

B.

Vulnerability scanning software cannot define the impact of an identified vulnerability on different business operations

C.

Vulnerability scanning software is limited in its ability to detect vulnerabilities at a given point in time

D.

Vulnerability scanning software is not immune to software engineering flaws that might lead to serious vulnerabilities being missed

Questions 204

Using nbtstat -A , NetBIOS names including <20> and <03> are retrieved, but shared folders cannot be listed. Why?

Options:
A.

File and printer sharing is disabled

B.

NetBIOS runs on a non-standard port

C.

nbtstat cannot enumerate shared folders

D.

The host is not in an AD domain

Questions 205

Richard, an attacker, targets an MNC. In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network.

What type of footprinting technique is employed by Richard?

Options:
A.

VPN footprinting

B.

Email footprinting

C.

VoIP footprinting

D.

Whois footprinting

Questions 206

During an IDS audit, you notice numerous alerts triggered by legitimate user activity. What is the most likely cause?

Options:
A.

Regular users are unintentionally triggering security protocols

B.

The firewall is failing to block malicious traffic

C.

The IDS is outdated and unpatched

D.

The IDS is configured with overly sensitive thresholds

Questions 207

Study the Snort rule given below:

[Image shows two Snort rules with alert messages for NETBIOS DCERPC ISystemActivator bind attempt, targeting TCP ports 135 and 445. References include CVE: CAN-2003-0352.]

Options:
A.

WebDav

B.

SQL Slammer

C.

MS Blaster

D.

MyDoom

Questions 208

What does a firewall check to prevent particular ports and applications from getting packets into an organization?

Options:
A.

Transport layer port numbers and application layer headers

B.

Presentation layer headers and the session layer port numbers

C.

Network layer headers and the session layer port numbers

D.

Application layer port numbers and the transport layer headers

Questions 209

In an enterprise environment, the network security team detects unusual behavior suggesting advanced sniffing techniques exploiting legacy protocols to intercept sensitive communications. Which of the following sniffing-related techniques presents the greatest challenge to detect and neutralize, potentially compromising confidential enterprise data?

Options:
A.

Steganographic payload embedding within SMTP email headers

B.

Encrypted data extraction via HTTP header field overflows

C.

Covert data interception via X2S packet fragmentation

D.

Covert channel establishment through Modbus protocol manipulation

Questions 210

Which of the following program infects the system boot sector and the executable files at the same time?

Options:
A.

Polymorphic virus

B.

Stealth virus

C.

Multipartite Virus

D.

Macro virus

Questions 211

During a security assessment, an attacker identifies a flaw in a multi-user file system. The system first verifies access rights to a temporary file created by a user. However, immediately after this verification, and before the file is processed, the attacker manages to swap the original file with a malicious version. This manipulation happens in the brief interval between the system's access verification and the moment it handles the file, resulting in the malicious file being treated as legitimate. Which vulnerability is the attacker exploiting?

Options:
A.

Time-of-validation/time-of-execution issue in resource management logic.

B.

Improper certificate validation in trusted communication channels.

C.

Integer overflow during arithmetic computations with limited memory bounds.

D.

Null pointer dereference leading to unexpected application behavior.

Questions 212

As a network administrator, you explain to your team that a recent DDoS attack targeted the application layer of your company’s web server. Which type of DDoS attack was most likely used?

Options:
A.

HTTP flood attack

B.

UDP flood attack

C.

ICMP flood attack

D.

SYN flood attack

Questions 213

An IoT traffic light shows anomalous traffic to an external IP and has an open port. What should be your next step?

Options:
A.

Attempt reverse connections

B.

Isolate the device and investigate firmware

C.

Modify firewall rules only

D.

Conduct full network penetration testing

Questions 214

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

Options:
A.

nessus

B.

tcpdump

C.

ethereal

D.

jack the ripper

Questions 215

What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

Options:
A.

AndroidManifest.xml

B.

APK.info

C.

resources.asrc

D.

classes.dex

Questions 216

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.

What kind of attack is Susan carrying on?

Options:
A.

A sniffing attack

B.

A spoofing attack

C.

A man-in-the-middle attack

D.

A denial of service attack

Questions 217

A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete.

Which attack is being described here?

Options:
A.

Desynchronization

B.

Slowloris attack

C.

Session splicing

D.

Phlashing

Questions 218

John is investigating web-application firewall logs and observers that someone is attempting to inject the following:

char buff[10];

buff[>o] - 'a':

What type of attack is this?

Options:
A.

CSRF

B.

XSS

C.

Buffer overflow

D.

SQL injection

Questions 219

James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an open-source framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources.

What is the framework used by James to conduct footprinting and reconnaissance activities?

Options:
A.

WebSploit Framework

B.

Browser Exploitation Framework

C.

OSINT framework

D.

SpeedPhish Framework

Questions 220

What does the –oX flag do in an Nmap scan?

Options:
A.

Perform an eXpress scan

B.

Output the results in truncated format to the screen

C.

Output the results in XML format to a file

D.

Perform an Xmas scan