Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-50v13 Exam Dumps - ECCouncil CEH v13 Questions and Answers

Question # 19

During a security assessment of a fintech startup in San Francisco, ethical hacker Michael analyzes the company ' s cloud platform. He observes that the system automates deployment, scaling, service discovery, and workload management across multiple nodes, ensuring smooth operation of critical services without requiring manual coordination. Which Kubernetes capability is primarily responsible for these functions?

Options:

A.

Kube-controller-manager

B.

Self-healing

C.

Container orchestration

D.

Container vulnerabilities

Buy Now
Question # 20

While analyzing logs, you observe a large number of TCP SYN packets sent to various ports with no corresponding ACKs. What scanning technique was likely used?

Options:

A.

SYN scan (half-open scanning)

B.

XMAS scan

C.

SYN/ACK scan

D.

TCP Connect scan

Buy Now
Question # 21

A security analyst investigates unusual east-west traffic on a corporate network. A rogue device has been physically inserted between a workstation and the switch, enabling unauthorized access while inheriting the workstation’s authenticated network state. Which evasion technique is being used?

Options:

A.

Exploiting a wireless rogue access point to tunnel through the firewall

B.

NAC bypass using a pre-authenticated device for network bridging

C.

Spoofing ARP responses from a dynamic IP allocation pool

D.

VLAN double tagging to shift between network segments

Buy Now
Question # 22

Multiple internal workstations and IoT devices are compromised and transmitting large volumes of traffic to numerous external targets under botnet control. Which type of denial-of-service attack best describes this situation?

Options:

A.

An attack where compromised internal devices participate in a botnet and flood external targets

B.

An attack relying on spoofed IP addresses to trick external servers

C.

A direct botnet flood without spoofing intermediary services

D.

An internal amplification attack using spoofed DNS responses

Buy Now
Question # 23

At Horizon Legal Services in Boston, Massachusetts, ethical hacker Daniel Price is tasked with assessing the security of the firm ' s mobile case-tracking app. During testing, he finds that confidential case notes and client records are kept locally on the device without encryption. By browsing the file system with a standard explorer tool, he can open sensitive information without any authentication. Which OWASP Top 10 Mobile Risk is most clearly present in the app?

Options:

A.

Insecure Communication

B.

Improper Credential Usage

C.

Insecure Data Storage

D.

Inadequate Privacy Controls

Buy Now
Question # 24

You suspect a Man-in-the-Middle (MitM) attack inside the network. Which network activity would help confirm this?

Options:

A.

Sudden increase in traffic

B.

Multiple login attempts from one IP

C.

IP addresses resolving to multiple MAC addresses

D.

Abnormal DNS request volumes

Buy Now
Question # 25

Which scenario best describes a slow, stealthy scanning technique?

Options:

A.

FIN scanning

B.

TCP connect scanning

C.

Xmas scanning

D.

Zombie-based idle scanning

Buy Now
Question # 26

In an enterprise environment, the network security team detects unusual behavior suggesting advanced sniffing techniques exploiting legacy protocols to intercept sensitive communications. Which of the following sniffing-related techniques presents the greatest challenge to detect and neutralize, potentially compromising confidential enterprise data?

Options:

A.

Steganographic payload embedding within SMTP email headers

B.

Encrypted data extraction via HTTP header field overflows

C.

Covert data interception via X2S packet fragmentation

D.

Covert channel establishment through Modbus protocol manipulation

Buy Now
Question # 27

Michael, an ethical hacker at a San Francisco-based fintech startup, is conducting a security assessment of the company ' s cloud-based payment processing platform, which uses Kubernetes, an open-source system for automating the deployment, scaling, and management of containerized applications. During his review, Michael identified a feature that automatically replaces and reschedules containers from failed nodes to ensure high availability of services a critical requirement for uninterrupted payment operations. Based on his study of cloud container technology principles, which Kubernetes feature should Michael highlight as responsible for this capability?

Options:

A.

Container vulnerabilities

B.

Kube-controller-manager

C.

Container orchestration

D.

Self-healing

Buy Now
Question # 28

You are an ethical hacker at SecureNet Solutions, conducting a penetration test for BlueRidge Manufacturing in Denver, Colorado. While auditing their wireless network, you observe that the access point uses a security protocol that employs the RC4 algorithm with a 24-bit initialization vector IV to encrypt data between network clients. Based on the observed encryption characteristics, which wireless encryption protocol is the access point using?

Options:

A.

WPA

B.

WPA2

C.

WEP

D.

WPA3

Buy Now
Question # 29

A system administrator observes that several machines in the network are repeatedly sending out traffic to unknown IP addresses. Upon inspection, these machines were part of a coordinated spam campaign. What is the most probable cause?

Options:

A.

Keyloggers were harvesting user credentials

B.

Devices were enslaved into a botnet network

C.

Browsers were redirected to adware-injected sites

D.

Worms exploited zero-day vulnerabilities

Buy Now
Question # 30

During an investigation, an ethical hacker discovers that a web application’s API has been compromised, leading to unauthorized access and data manipulation. The attacker is using webhooks and a webshell. To prevent further exploitation, which of the following actions should be taken?

Options:

A.

Implement a Web Application Firewall (WAF) with rules to block webshell traffic and increase the logging verbosity of webhooks.

B.

Perform regular code reviews for the webhooks and modify the API to block connections from unknown IP addresses.

C.

Harden the web server security, add multi-factor authentication for API users, and restrict the execution of scripts server-side.

D.

Implement input validation on all API endpoints, review webhook payloads, and schedule regular scanning for webshells.

Buy Now
Question # 31

A penetration tester is assessing a company’s vulnerability to advanced social engineering attacks targeting its legal department. Using detailed knowledge of mergers and legal proceedings, the tester crafts a highly credible pretext to deceive legal employees into sharing confidential case documents. What is the most effective technique?

Options:

A.

Send a spear-phishing email referencing specific merger details and requesting document access

B.

Create a fake LinkedIn profile to connect with legal employees and request document sharing

C.

Visit the office in person posing as a new legal intern to request document access

D.

Conduct a mass phishing campaign with generic legal templates attached

Buy Now
Question # 32

A payload causes a significant delay in response without visible output when testing an Oracle-backed application. What SQL injection technique is being used?

Options:

A.

Time-based SQL injection using WAITFOR DELAY

B.

Heavy query-based SQL injection

C.

Union-based SQL injection

D.

Out-of-band SQL injection

Buy Now
Question # 33

In a controlled testing environment in Houston, Sarah, an ethical hacker, is tasked with evaluating the security posture of a financial firm’s network using the cyber kill chain methodology. She begins by simulating an attack, starting with gathering publicly available data about the company’s employees and infrastructure. Next, she plans to craft a mock phishing email to test employee responses, followed by deploying a harmless payload to assess system vulnerabilities. As part of her authorized penetration test, what phase of the cyber kill chain should Sarah prioritize to simulate the adversary’s approach effectively?

Options:

A.

Exploitation

B.

Reconnaissance

C.

Weaponization

D.

Delivery

Buy Now
Exam Code: 312-50v13
Exam Name: Certified Ethical Hacker Exam (CEHv13)
Last Update: Mar 15, 2026
Questions: 584
312-50v13 pdf

312-50v13 PDF

$25.5  $84.99
312-50v13 Engine

312-50v13 Testing Engine

$28.5  $94.99
312-50v13 PDF + Engine

312-50v13 PDF + Testing Engine

$40.5  $134.99