Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-50v13 Practice Exam with Questions & Answers | Set: 13

Questions 241

Which WPA2 vulnerability allows packet interception and replay?

Options:
A.

Hole196 vulnerability

B.

KRACK vulnerability

C.

WPS PIN recovery

D.

Weak RNG

ECCouncil 312-50v13 Premium Access
Questions 242

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

Options:
A.

PEM

B.

ppp

C.

IPSEC

D.

SET

Questions 243

When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by passive network sniffing?

Options:
A.

Identifying operating systems, services, protocols and devices

B.

Modifying and replaying captured network traffic

C.

Collecting unencrypted information about usernames and passwords

D.

Capturing a network traffic for further analysis

Questions 244

During a security assessment of a cloud-hosted application using SOAP-based web services, a red team operator intercepts a valid SOAP request, duplicates the signed message body, inserts it into the same envelope, and forwards it. Due to improper validation, the server accepts the duplicated body and executes unauthorized code. What type of attack does this represent?

Options:
A.

Cloud snooper attack

B.

Cryptanalysis attack

C.

Wrapping attack

D.

IMDS abuse

Questions 245

A penetration tester is assessing an IoT thermostat used in a smart home system. The device communicates with a cloud server for updates and commands. The tester discovers that communication between the device and the cloud server is not encrypted. What is the most effective way to exploit this vulnerability?

Options:
A.

Conduct a Cross-Site Scripting (XSS) attack on the thermostat’s web interface

B.

Perform a brute-force attack on the thermostat’s local admin login

C.

Execute a SQL injection attack on the cloud server's login page

D.

Use a man-in-the-middle (MitM) attack to intercept and manipulate unencrypted communication

Questions 246

A network admin contacts you. He is concerned that ARP spoofing or poisoning might occur on his network. What are some things he can do to prevent it? Select the best answers.

Options:
A.

Use port security on his switches.

B.

Use a tool like ARPwatch to monitor for strange ARP activity.

C.

Use a firewall between all LAN segments.

D.

If you have a small network, use static ARP entries.

E.

Use only static IP addresses on all PC's.

Questions 247

At what stage of the cyber kill chain theory model does data exfiltration occur?

Options:
A.

Actions on objectives

B.

Weaponization

C.

installation

D.

Command and control

Questions 248

You want to analyze packets on your wireless network. Which program would you use?

Options:
A.

Wireshark with Airpcap

B.

Airsnort with Airpcap

C.

Wireshark with Winpcap

D.

Ethereal with Winpcap

Questions 249

Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?

Options:
A.

XXE

B.

SQLi

C.

IDOR

D.

XSS

Questions 250

A CEH has mirrored a website, identified session hijacking risk, and wants to minimize detection. What is the most appropriate next step?

Options:
A.

Attempt SQL Injection

B.

Hijack a session and modify server configuration

C.

Launch brute-force attacks

D.

Perform automated vulnerability scanning

Questions 251

John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the IoT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of IoT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John in the above scenario?

Options:
A.

IoTSeeker

B.

IoT Inspector

C.

AT&T IoT Platform

D.

Azure IoT Central

Questions 252

A penetration tester intercepts HTTP requests between a user and a vulnerable web server. The tester observes that the session ID is embedded in the URL, and the web application does not regenerate the session upon login. Which session hijacking technique is most likely to succeed in this scenario?

Options:
A.

Injecting JavaScript to steal session cookies via cross-site scripting

B.

DNS cache poisoning to redirect users to fake sites

C.

Session fixation by pre-setting the token in a URL

D.

Cross-site request forgery exploiting user trust in websites

Questions 253

what is the port to block first in case you are suspicious that an loT device has been compromised?

Options:
A.

22

B.

443

C.

48101

D.

80

Questions 254

When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, DELETE, PUT, TRACE) using NMAP script engine. What Nmap script will help you with this task?

Options:
A.

http-methods

B.

http enum

C.

http-headers

D.

http-git

Questions 255

env x='(){ :;};echo exploit' bash –c 'cat /etc/passwd'

What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

Options:
A.

Removes the passwd file

B.

Changes all passwords in passwd

C.

Add new user to the passwd file

D.

Display passwd content to prompt

Questions 256

A penetration tester discovers malware on a system that disguises itself as legitimate software but performs malicious actions in the background. What type of malware is this?

Options:
A.

Trojan

B.

Spyware

C.

Worm

D.

Rootkit

Questions 257

What is the role of test automation in security testing?

Options:
A.

It is an option but it tends to be very expensive.

B.

It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.

C.

Test automation is not usable in security due to the complexity of the tests.

D.

It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.

Questions 258

During a reconnaissance mission, an ethical hacker uses Maltego, a popular footprinting tool, to collect information about a target organization. The information includes the target's Internet infrastructure details (domains, DNS names, Netblocks, IP address information). The hacker decides to use social engineering

techniques to gain further information. Which of the following would be the least likely method of social engineering to yield beneficial information based on the data collected?

Options:
A.

Shoulder surfing to observe sensitive credentials input on the target's computers

B.

Impersonating an ISP technical support agent to trick the target into providing further network details

C.

Dumpster diving in the target company’s trash bins for valuable printouts

D.

Eavesdropping on internal corporate conversations to understand key topics

Questions 259

One customer’s malicious activity impacts other tenants. Which control would best prevent this?

Options:
A.

Strong encryption

B.

Secure log management

C.

Multi-tenant isolation

D.

Strong authentication

Questions 260

You are trying to break into a highly secure mainframe system at a bank. Conventional hacking doesn't work because of strong technical defenses. You aim to exploit the human element instead.

How would you proceed?

Options:
A.

Look for zero-day exploits at underground hacker websites and buy them

B.

Try to hang around local pubs or restaurants near the bank, get talking to a disgruntled employee, and offer them money for sensitive access

C.

Launch a DDoS attack using thousands of zombies

D.

Conduct a Man-in-the-Middle (MiTM) attack using DNS cache poisoning