Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-50v13 Exam Dumps - ECCouncil CEH v13 Questions and Answers

Question # 139

A penetration tester is assessing a mobile application and discovers that the app is vulnerable to improper session management. The session tokens are not invalidated upon logout, allowing the tokens to be reused. What is the most effective way to exploit this vulnerability?

Options:

A.

Perform a replay attack by using the same session token after the user logs out

B.

Use a Cross-Site Request Forgery (CSRF) attack to steal the session tokens

C.

Use a brute-force attack to guess valid session tokens

D.

Execute a SQL injection attack to retrieve session tokens from the database

Buy Now
Question # 140

During a controlled red team engagement at a financial institution in New Jersey, ethical hacker Ryan tests the bank ' s resilience against stealth-based malware. He plants a custom malicious program on an employee workstation. After execution, he observes that the infected files continue to function normally, but his malware conceals its modifications by intercepting operating system calls. Antivirus scans repeatedly return “no threats detected,” even though the malicious code remains active and hidden on the system.

Which type of virus did Ryan most likely deploy in this assessment?

Options:

A.

Cavity Virus

B.

Stealth Virus

C.

Polymorphic Virus

D.

Macro Virus

Buy Now
Question # 141

Which tool is best for sniffing plaintext HTTP traffic?

Options:

A.

Nessus

B.

Nmap

C.

Netcat

D.

Wireshark

Buy Now
Question # 142

During a penetration test at Windy City Enterprises in Chicago, ethical hacker Mia Torres targets the company ' s public-facing site. By exploiting an unpatched vulnerability in the web server, she manages to alter visible content on the homepage, replacing it with unauthorized messages. Mia explains to the IT team that this kind of attack can damage the company ' s reputation and erode customer trust, even if sensitive data is not directly stolen.

Which type of web server attack is Mia most likely demonstrating?

Options:

A.

DNS Hijacking

B.

Frontjacking

C.

File Upload Exploits

D.

Website Defacement

Buy Now
Question # 143

A cybersecurity research team identifies suspicious behavior on a user’s Android device. Upon investigation, they discover that a seemingly harmless app, downloaded from a third-party app store, has silently overwritten several legitimate applications such as WhatsApp and SHAREit. These fake replicas maintain the original icon and user interface but serve intrusive advertisements and covertly harvest credentials and personal data in the background. The attackers achieved this by embedding malicious code in utility apps like video editors and photo filters, which users were tricked into installing. The replacement occurred without user consent, and the malicious code communicates with a command-and-control (C & C) server to execute further instructions. What type of attack is being carried out in this scenario?

Options:

A.

Simjacker attack

B.

Man-in-the-Disk attack

C.

Agent Smith attack

D.

Camfecting attack

Buy Now
Question # 144

A penetration tester has gained access to a target system using default credentials. What is the most effective next step to escalate privileges on the system?

Options:

A.

Perform a denial-of-service (DoS) attack to crash the system

B.

Use a known local privilege escalation vulnerability to gain admin access

C.

Execute a Cross-Site Scripting (XSS) attack on the system ' s login page

D.

Use a dictionary attack to brute-force the root password

Buy Now
Question # 145

You are Ethan Brooks, an ethical hacker at Vanguard Security Solutions, hired to perform a wireless penetration test for Pacific Logistics, a shipping company in Seattle, Washington. Your task is to identify all Wi-Fi networks in range without alerting the network administrators. Using a laptop with a Wi-Fi card, you monitor radio channels to detect access points and their BSSIDs without sending any probe requests or injecting data packets.

Based on the described method, which Wi-Fi discovery technique are you employing?

Options:

A.

Network Discovery Software

B.

Passive Footprinting

C.

Wash Command

D.

Active Footprinting

Buy Now
Question # 146

Sarah, an ethical hacker at a San Francisco-based financial firm, is testing the security of their customer database after a recent data exposure incident. Her analysis reveals that the sensitive client information is safeguarded using a symmetric encryption algorithm. She observes that the algorithm processes data in 64-bit blocks and supports a variable key size from 32 to 448 bits. During her penetration test, Sarah intercepts a ciphertext transmission and notes that the encryption was developed as a replacement for DES, an older algorithm. She aims to determine if the algorithm’s flexible key size could be susceptible to brute-force attacks. The algorithm is also noted for its use in secure storage, a critical application for the firm’s data protection.

Which symmetric encryption algorithm should Sarah identify as the one used by the firm?

Options:

A.

RC4

B.

Twofish

C.

AES

D.

Blowfish

Buy Now
Question # 147

During a penetration test at a financial services company in Denver, ethical hacker Jason demonstrates how employees could be tricked by a rogue DHCP server. To help the client prevent such attacks in the future, Jason shows the administrators how to configure their Cisco switches to reject DHCP responses from untrusted ports. He explains that this global setting must be activated before more granular controls can be applied.

Which switch command should Jason recommend to implement this defense?

Options:

A.

Switch(config)# ip dhcp snooping

B.

Switch(config)# ip arp inspection vlan 10

C.

Switch(config)# ip dhcp snooping vlan 10

D.

Switch(config-if)# ip dhcp snooping trust

Buy Now
Question # 148

Malware infecting multiple systems remains dormant until triggered and changes its code or encryption with each infection to evade detection. Which malware type best fits this description, and what is the most effective mitigation?

Options:

A.

Rootkit – use anti-rootkit tools and patch systems

B.

Adware – deploy anti-adware tools and train users

C.

Worm – isolate infected systems and scan the network

D.

Polymorphic malware – use behavior-based detection and ensure systems are patched

Buy Now
Question # 149

During an internal assessment, a penetration tester gains access to a hash dump containing NTLM password hashes from a compromised Windows system. To crack the passwords efficiently, the tester uses a high-performance CPU setup with Hashcat, attempting millions of password combinations per second. Which technique is being optimized in this scenario?

Options:

A.

Spoof NetBIOS to impersonate a file server

B.

Leverage hardware acceleration for cracking speed

C.

Dump SAM contents for offline password retrieval

D.

Exploit dictionary rules with appended symbols

Buy Now
Question # 150

During a security assessment in San Francisco, an ethical hacker is tasked with evaluating a network ' s resilience against stealthy reconnaissance attempts. The hacker needs to employ a scanning technique that leverages TCP flags to evade detection by intrusion detection systems, relying on the target ' s response behavior to infer port states without completing a full connection. Which approach best aligns with this strategy, ensuring minimal visibility during the assessment?

Options:

A.

TCP Connect Scan

B.

Network Scanning

C.

FIN Scan

D.

NULL Scan

Buy Now
Question # 151

A penetration tester is tasked with uncovering historical content from a company’s website, including previously exposed login portals or sensitive internal pages. Direct interaction with the live site is prohibited due to strict monitoring policies. To stay undetected, the tester decides to explore previously indexed snapshots of the organization’s web content saved by external sources. Which approach would most effectively support this passive information-gathering objective?

Options:

A.

Search with intext: " login " site:target.com to retrieve login data

B.

Use the link: operator to find backlinks to login portals

C.

Apply the cache: operator to view Google ' s stored versions of target pages

D.

Use the intitle:login operator to list current login pages

Buy Now
Question # 152

During security awareness training, which scenario best describes a tailgating social engineering attack?

Options:

A.

An attacker impersonates a customer to recover account credentials

B.

An attacker leaves a malicious USB labeled “Employee Bonus List”

C.

A person gains access to a secure building by following an authorized employee through a locked door

D.

An email urges employees to enter credentials for an urgent system update

Buy Now
Question # 153

You are Jordan, a cryptographic assessor at Cascade Data in Portland, Oregon, reviewing the protection applied to telemetry logs. Your review finds an algorithm that operates on 128-bit blocks, accepts keys up to 256 bits, and the documentation notes it was one of the finalists in the AES selection process that aimed to replace legacy DES. Which symmetric encryption algorithm should you identify as being used?

Options:

A.

RC4

B.

AES

C.

Blowfish

D.

Twofish

Buy Now
Exam Code: 312-50v13
Exam Name: Certified Ethical Hacker Exam (CEHv13)
Last Update: Mar 15, 2026
Questions: 584
312-50v13 pdf

312-50v13 PDF

$25.5  $84.99
312-50v13 Engine

312-50v13 Testing Engine

$28.5  $94.99
312-50v13 PDF + Engine

312-50v13 PDF + Testing Engine

$40.5  $134.99