Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-50v13 Exam Dumps - ECCouncil CEH v13 Questions and Answers

Question # 79

A penetration tester is hired to legally assess the security of a company ' s network by identifying vulnerabilities and attempting to exploit them. What type of hacker is this?

Options:

A.

Black Hat

B.

Grey Hat

C.

Script Kiddie

D.

White Hat

Buy Now
Question # 80

A payload causes a significant delay in response without visible output when testing an Oracle-backed application. What SQL injection technique is being used?

Options:

A.

Time-based SQL injection using WAITFOR DELAY

B.

Heavy query-based SQL injection

C.

Union-based SQL injection

D.

Out-of-band SQL injection

Buy Now
Question # 81

A penetration tester is conducting an external assessment of a corporate web server. They start by accessing https://www.targetcorp.com/robots.txt and observe multiple Disallow entries that reference directories such as /admin-panel/, /backup/, and /confidentialdocs/. When the tester directly visits these paths via a browser, they find that access is not restricted by authentication and gain access to sensitive files, including server configuration and unprotected credentials. Which stage of the web server attack methodology is demonstrated in this scenario?

Options:

A.

Injecting malicious SQL queries to access sensitive database records

B.

Performing a cross-site request forgery (CSRF) attack to manipulate user actions

C.

Gathering information through exposed indexing instructions

D.

Leveraging the directory traversal flaw to access critical server files

Buy Now
Question # 82

A penetration tester discovers malware on a system that disguises itself as legitimate software but performs malicious actions in the background. What type of malware is this?

Options:

A.

Trojan

B.

Spyware

C.

Worm

D.

Rootkit

Buy Now
Question # 83

Customer data in a cloud environment was exposed due to an unknown vulnerability. What is the most likely cause?

Options:

A.

Misconfigured security groups

B.

Brute force attack

C.

DoS attack

D.

Side-channel attack

Buy Now
Question # 84

During a penetration test for a U.S.-based retail company, John gains access to a secondary server that responds unusually to structured queries. By sending a specially crafted request, he receives a full list of subdomains, MX records, and aliases belonging to the target organization. The response exposes sensitive internal mappings that could be leveraged for further attacks.

Which tool was MOST likely used to perform this enumeration?

Options:

A.

smtp-user-enum.pl -u user -t host

B.

ldapsearch -h -x

C.

nbtstat -A

D.

dig @server axfr

Buy Now
Question # 85

A security researcher reviewing an organization ' s website source code finds references to Amazon S3 file locations. What is the most effective way to identify additional publicly accessible S3 bucket URLs used by the target?

Options:

A.

Exploit XSS to force the page to reveal the S3 links

B.

Use Google advanced search operators to enumerate S3 bucket URLs

C.

Use SQL injection to extract internal file paths from the database

D.

Perform packet sniffing to intercept internal S3 bucket names

Buy Now
Question # 86

A penetration tester detects malware on a system that secretly records all keystrokes entered by the user. What type of malware is this?

Options:

A.

Rootkit

B.

Ransomware

C.

Keylogger

D.

Worm

Buy Now
Question # 87

A penetration tester is running a vulnerability scan on a company’s network. The scan identifies an open port with a high-severity vulnerability linked to outdated software. What is the most appropriate next step for the tester?

Options:

A.

Execute a denial-of-service (DoS) attack on the open port

B.

Perform a brute-force attack on the service running on the open port

C.

Research the vulnerability and determine if it has a publicly available exploit

D.

Ignore the vulnerability and focus on finding more vulnerabilities

Buy Now
Question # 88

During a red team simul-ation, an attacker crafts packets with malformed checksums so the IDS accepts them but the target silently discards them. Which evasion technique is being employed?

Options:

A.

Insertion attack

B.

Polymorphic shellcode

C.

Session splicing

D.

Fragmentation attack

Buy Now
Question # 89

As an IT security analyst, you perform network scanning using ICMP Echo Requests. During the scan, several IP addresses do not return Echo Replies, yet other network services remain operational. How should this situation be interpreted?

Options:

A.

The non-responsive IP addresses indicate severe network congestion.

B.

A firewall or security control is likely blocking ICMP Echo Requests.

C.

The lack of Echo Replies indicates an active security breach.

D.

The IP addresses are unused and available for reassignment.

Buy Now
Question # 90

During a review for DoS threats, several IP addresses generate excessive traffic. Packet inspection shows the TCP three-way handshake is never completed, leaving many connections in a SYN_RECEIVED state and consuming server resources without completing sessions. What type of DoS attack is most likely occurring?

Options:

A.

SYN Flood

B.

Ping of Death

C.

UDP Flood

D.

Smurf Attack

Buy Now
Question # 91

A global fintech company receives extortion emails threatening a severe DDoS attack unless ransom is paid. The attacker briefly launches an HTTP flood to demonstrate capability. The attack uses incomplete POST requests that overload application-layer resources, causing performance degradation. The attacker reinforces their demand with a second threat email. What type of DDoS attack is being carried out?

Options:

A.

RDDoS attack combining threat and extortion

B.

DRDoS attack using intermediaries

C.

Recursive GET flood disguised as crawling

D.

Pulse wave attack with burst patterns

Buy Now
Question # 92

Which sophisticated DoS technique is hardest to detect and mitigate?

Options:

A.

Distributed SQL injection DoS

B.

Coordinated UDP flood on DNS servers

C.

Zero-day exploit causing service crash

D.

Smurf attack using ICMP floods

Buy Now
Question # 93

A penetration tester is evaluating a web application that does not properly validate the authenticity of HTTP requests. The tester suspects the application is vulnerable to Cross-Site Request Forgery (CSRF). Which approach should the tester use to exploit this vulnerability?

Options:

A.

Execute a directory traversal attack to access restricted server files

B.

Create a malicious website that sends a crafted request on behalf of the user when visited

C.

Perform a brute-force attack on the application’s login page to guess weak credentials

D.

Inject a SQL query into the input fields to perform SQL injection

Buy Now
Exam Code: 312-50v13
Exam Name: Certified Ethical Hacker Exam (CEHv13)
Last Update: Mar 15, 2026
Questions: 584
312-50v13 pdf

312-50v13 PDF

$25.5  $84.99
312-50v13 Engine

312-50v13 Testing Engine

$28.5  $94.99
312-50v13 PDF + Engine

312-50v13 PDF + Testing Engine

$40.5  $134.99