Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-50v13 Practice Exam with Questions & Answers | Set: 3

Questions 41

During a security assessment, a consultant investigates how the application handles requests from authenticated users. They discover that once a user logs in, the application does not verify the origin of subsequent requests. To exploit this, the consultant creates a web page containing a malicious form that submits a funds transfer request to the application. A logged-in user, believing the page is part of a promotional campaign, fills out the form and submits it. The application processes the request successfully without any reauthentication or user confirmation, completing the transaction under the victim’s session. Which session hijacking technique is being used in this scenario?

Options:
A.

Hijacking a user session using a session fixation attack

B.

Hijacking a user session using a session replay attack

C.

Hijacking a user session using a cross-site request forgery attack

D.

Hijacking a user session using a cross-site script attack

ECCouncil 312-50v13 Premium Access
Questions 42

Attacker Rony Installed a rogue access point within an organization's perimeter and attempted to Intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Johnson in the above scenario?

Options:
A.

Distributed assessment

B.

Wireless network assessment

C.

Host-based assessment

D.

Application assessment

Questions 43

Yancey is a network security administrator for a large electric company. He becomes disgruntled after learning that he will be laid off and decides to sabotage the company by placing logic bombs, backdoors, and other malware in the system. He does not care if his actions lead to jail time.

What would Yancey be considered?

Options:
A.

Yancey would be considered a Suicide Hacker

B.

Since he does not care about going to jail, he would be considered a Black Hat

C.

Because Yancey works for the company currently; he would be a White Hat

D.

Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing

Questions 44

Miley, a professional hacker, decided to attack a target organization's network. To perform the attack, she used a tool to send fake ARP messages over the target network to link her MAC address with the target system's IP address. By performing this, Miley received messages directed to the victim's MAC address and further used the tool to intercept, steal, modify, and block sensitive communication to the target system.

What is the tool employed by Miley to perform the above attack?

Options:
A.

Gobbler

B.

KDerpNSpoof

C.

BetterCAP

D.

Wireshark

Questions 45

Cross-site request forgery involves:

Options:
A.

A request sent by a malicious user from a browser to a server

B.

Modification of a request by a proxy between client and server

C.

A browser making a request to a server without the user’s knowledge

D.

A server making a request to another server without the user’s knowledge

Questions 46

During a red team test, a web application dynamically builds SQL queries using a numeric URL parameter. The tester sends the following request:

http://vulnerableapp.local/view.php?id=1; DROP TABLE users;

The application throws errors and the users table is deleted. Which SQL injection technique was used?

Options:
A.

UNION-based SQL injection

B.

Stacked (Piggybacked) queries

C.

Boolean-based SQL injection

D.

Error-based SQL injection

Questions 47

Which best describes the role of a penetration tester?

Options:
A.

Unauthorized malicious hacker

B.

Malware distributor

C.

Authorized security professional who exploits vulnerabilities

D.

Malicious code developer

Questions 48

Which method of password cracking takes the most time and effort?

Options:
A.

Dictionary attack

B.

Shoulder surfing

C.

Rainbow tables

D.

Brute force

Questions 49

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

Options:
A.

BA810DBA98995F1817306D272A9441BB

B.

44EFCE164AB921CQAAD3B435B51404EE

C.

0182BD0BD4444BF836077A718CCDF409

D.

CEC52EB9C8E3455DC2265B23734E0DAC

E.

B757BF5C0D87772FAAD3B435B51404EE

F.

E52CAC67419A9A224A3B108F3FA6CB6D

Questions 50

Which method best bypasses client-side controls without triggering server-side alarms?

Options:
A.

Disable JavaScript in the browser

B.

Intercept and modify requests using a proxy tool

C.

Inject malicious JavaScript into the login form

D.

Reverse-engineer the encryption algorithm

Questions 51

While browsing his Facebook feed, Matt sees a picture one of his friends posted with the caption, "Learn more about your friends!", along with a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate, Matt responds to the questions in the post. A few days later, Matt's bank account has been accessed, and the password has been changed. What most likely happened?

Options:
A.

Matt inadvertently provided the answers to his security questions when responding to the post.

B.

Matt's bank account login information was brute forced.

C.

Matt inadvertently provided his password when responding to the post.

D.

Matt's computer was infected with a keylogger.

Questions 52

As an IT technician in a small software development company, you are responsible for protecting the network against various cyber threats. You learn that attackers often try to bypass firewalls. Which of the following is a common technique used by attackers to evade firewall detection?

Options:
A.

Changing the source IP address of packets to make traffic appear to originate from a trusted source

B.

Using encrypted communication channels to evade network monitoring tools

C.

Using social engineering techniques to trick employees into revealing sensitive information

D.

Implementing an open-source operating system to bypass proprietary software restrictions

Questions 53

Attempting an injection attack on a web server based on responses to True/False QUESTION NO:s is called which of the following?

Options:
A.

Compound SQLi

B.

Blind SQLi

C.

Classic SQLi

D.

DMS-specific SQLi

Questions 54

Your company was hired by a small healthcare provider to perform a technical assessment on the network.

What is the best approach for discovering vulnerabilities on a Windows-based computer?

Options:
A.

Use the built-in Windows Update tool

B.

Use a scan tool like Nessus

C.

Check MITRE.org for the latest list of CVE findings

D.

Create a disk image of a clean Windows installation

Questions 55

Which of the following provides a security professional with most information about the system’s security posture?

Options:
A.

Phishing, spamming, sending trojans

B.

Social engineering, company site browsing, tailgating

C.

Wardriving, warchalking, social engineering

D.

Port scanning, banner grabbing, service identification

Questions 56

Which advanced evasion technique poses the greatest challenge to detect and mitigate?

Options:
A.

Covert channel communication using IP header fields

B.

Honeypot spoofing

C.

Polymorphic malware

D.

Packet fragmentation evasion

Questions 57

You discover a Web API integrated with webhooks and an existing administrative web shell. Your objective is to compromise the system while leaving minimal traces. Which technique is most effective?

Options:
A.

SSRF to perform unauthorized API calls

B.

IDOR exploitation

C.

Upload malicious scripts via the web shell

D.

Manipulate the webhook for unintended data transfer

Questions 58

Working as an Information Security Analyst at a technology firm, you are designing training material for employees about the dangers of session hijacking. As part of the training, you want to explain how attackers could use sidejacking to compromise user accounts. Which of the following scenarios most accurately describes a sidejacking attack?

Options:
A.

An attacker exploits a vulnerability in the company’s network firewall to gain unauthorized access to internal systems.

B.

An attacker intercepts network traffic, captures unencrypted session cookies, and uses them to impersonate the user.

C.

An attacker uses social engineering techniques to trick an employee into revealing their password.

D.

An attacker convinces an employee to visit a malicious website that injects a harmful script into their browser.

Questions 59

OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?

Options:
A.

openssl s_client -site www.website.com:443

B.

openssl_client -site www.website.com:443

C.

openssl s_client -connect www.website.com:443

D.

openssl_client -connect www.website.com:443

Questions 60

Targeted, logic-based credential guessing using prior intel best describes which technique?

Options:
A.

Strategic pattern-based input using known logic

B.

Exhaustive brute-force testing

C.

Shoulder surfing

D.

Rule-less hybrid attack