Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-50v13 Practice Exam with Questions & Answers | Set: 2

Questions 21

While performing a security audit of a web application, an ethical hacker discovers a potential vulnerability.

The application responds to logically incorrect queries with detailed error messages that divulge the underlying database's structure. The ethical hacker decides to exploit this vulnerability further. Which type of SQL Injection attack is the ethical hacker likely to use?

Options:
A.

UNION SQL Injection

B.

Blind/inferential SQL Injection

C.

In-band SQL Injection

D.

Error-based SOL Injection

ECCouncil 312-50v13 Premium Access
Questions 22

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?

Options:
A.

Exploration

B.

Investigation

C.

Reconnaissance

D.

Enumeration

Questions 23

Which technique is least useful during passive reconnaissance?

Options:
A.

WHOIS lookup

B.

Search engines

C.

Social media monitoring

D.

Nmap scanning

Questions 24

While testing a web application in development, you notice that the web server does not properly ignore the “dot dot slash” (../) character string and instead returns the file listing of a folder structure of the server.

What kind of attack is possible in this scenario?

Options:
A.

Cross-site scripting

B.

Denial of service

C.

SQL injection

D.

Directory traversal

Questions 25

A kernel-level rootkit is discovered. What is the safest remediation strategy?

Options:
A.

Power down immediately

B.

Deploy honeypots

C.

Full system format and reinstall

D.

Use rootkit scanners and tailored removal

Questions 26

You are instructed to perform a TCP NULL scan. In the context of TCP NULL scanning, which response indicates that a port on the target system is closed?

Options:
A.

ICMP error message

B.

TCP SYN/ACK packet

C.

No response

D.

TCP RST packet

Questions 27

Customer data in a cloud environment was exposed due to an unknown vulnerability. What is the most likely cause?

Options:
A.

Misconfigured security groups

B.

Brute force attack

C.

DoS attack

D.

Side-channel attack

Questions 28

A web server is overwhelmed by many slow, incomplete HTTP connections. What attack is occurring?

Options:
A.

Slowloris attack

B.

ICMP flood

C.

UDP flood

D.

Fragmentation attack

Questions 29

During a cryptographic audit of a legacy system, a security analyst observes that an outdated block cipher is leaking key-related information when analyzing large sets of plaintext–ciphertext pairs. What approach might an attacker exploit here?

Options:
A.

Launch a key replay through IV duplication

B.

Use linear approximations to infer secret bits

C.

Modify the padding to obtain plaintext

D.

Attack the hash algorithm for collisions

Questions 30

Mary found a high vulnerability during a vulnerability scan and notified her server team. After analysis, they sent her proof that a fix to that issue had already been applied. The vulnerability that Marry found is called what?

Options:
A.

False-negative

B.

False-positive

C.

Brute force attack

D.

Backdoor

Questions 31

Sam, a professional hacker. targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS 1AM credentials and further compromise the employee's account. What is the technique used by Sam to compromise the AWS IAM credentials?

Options:
A.

Social engineering

B.

insider threat

C.

Password reuse

D.

Reverse engineering

Questions 32

Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil Corp’s lobby. He checks his current SID, which is:

S-1-5-21-1223352397-1872883824-861252104-501

What needs to happen before Matthew has full administrator access?

Options:
A.

He must perform privilege escalation.

B.

He needs to disable antivirus protection.

C.

He needs to gain physical access.

D.

He already has admin privileges, as shown by the “501” at the end of the SID.

Questions 33

John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the IDAP service for sensitive information such as usernames. addresses, departmental details, and server names to launch further attacks on the target organization.

What is the tool employed by John to gather information from the IDAP service?

Options:
A.

jxplorer

B.

Zabasearch

C.

EarthExplorer

D.

Ike-scan

Questions 34

which of the following protocols can be used to secure an LDAP service against anonymous queries?

Options:
A.

SSO

B.

RADIUS

C.

WPA

D.

NTLM

Questions 35

The collection of potentially actionable, overt, and publicly available information is known as

Options:
A.

Open-source intelligence

B.

Real intelligence

C.

Social intelligence

D.

Human intelligence

Questions 36

While using your bank’s online servicing you notice the following string in the URL bar:

"http://www.MyPersonalBank.com/account?id=368940911028389 &Damount=10980&Camount=21"

You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflects the changes.

Which type of vulnerability is present on this site?

Options:
A.

Cookie Tampering

B.

SQL Injection

C.

Web Parameter Tampering

D.

XSS Reflection

Questions 37

Stephen, an attacker, targeted the industrial control systems of an organization. He generated a fraudulent email with a malicious attachment and sent it to employees of the target organization. An employee who manages the sales software of the operational plant opened the fraudulent email and clicked on the malicious attachment. This resulted in the malicious attachment being downloaded and malware being injected into the sales software maintained in the victim's system. Further, the malware propagated itself to other networked systems, finally damaging the industrial automation components.

What is the attack technique used by Stephen to damage the industrial systems?

Options:
A.

Spear-phishing attack

B.

SMiShing attack

C.

Reconnaissance attack

D.

HMI-based attack

Questions 38

You are a cybersecurity specialist at CloudTech Inc., a company providing cloud-based services. You are managing a project for a client who wants to migrate their sensitive data to a public cloud service. To comply with regulatory requirements, the client insists on maintaining full control over the encryption keys even when the data is at rest on the cloud. Which of the following practices should you implement to meet this requirement?

Options:
A.

Use the cloud service provider's encryption services but store keys on-premises.

B.

Use the cloud service provider's default encryption and key management services.

C.

Rely on Secure Sockets Layer (SSL) encryption for data at rest.

D.

Encrypt data client-side before uploading to the cloud and retain control of the encryption keys.

Questions 39

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

Options:
A.

Macro virus

B.

Stealth/Tunneling virus

C.

Cavity virus

D.

Polymorphic virus

Questions 40

A sophisticated injection attack bypassed validation using obfuscation. What is the best future defense?

Options:
A.

Continuous code review and penetration testing

B.

Deploy WAF with evasion detection

C.

SIEM monitoring

D.

Enforce 2FA