Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

312-50v13 Exam Dumps - ECCouncil CEH v13 Questions and Answers

Question # 109

Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?

Options:

A.

XXE

B.

SQLi

C.

IDOR

D.

XSS

Buy Now
Question # 110

Which system consists of a publicly available set of databases that contain domain name registration contact information?

Options:

A.

WHOIS

B.

CAPTCHA

C.

IANA

D.

IETF

Buy Now
Question # 111

Which of these is capable of searching for and locating rogue access points?

Options:

A.

HIDS

B.

WISS

C.

WIPS

D.

NIDS

Buy Now
Question # 112

An IT security team is conducting an internal review of security protocols in their organization to identify

potential vulnerabilities. During their investigation, they encounter a suspicious program running on several

computers. Further examination reveals that the program has been logging all user keystrokes. How can the

security team confirm the type of program and what countermeasures should be taken to ensure the same

attack does not occur in the future?

Options:

A.

The program is a Trojan; the tearm should regularly update antivirus software and install a reliable firewall

B.

The program is spyware; the team should use password managers and encrypt sensitive data

C.

The program is a keylogger; the team should employ intrusion detection systems and regularly update the system software

D.

The program is a keylogger; the team should educate employees about phishing attacks and maintain regular backups

Buy Now
Question # 113

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?

Options:

A.

Key derivation function

B.

Key reinstallation

C.

A Public key infrastructure

D.

Key stretching

Buy Now
Question # 114

Which of the following commands checks for valid users on an SMTP server?

Options:

A.

RCPT

B.

CHK

C.

VRFY

D.

EXPN

Buy Now
Question # 115

What is the purpose of a DNS AAAA record?

Options:

A.

Authorization, Authentication and Auditing record

B.

Address prefix record

C.

Address database record

D.

IPv6 address resolution record

Buy Now
Question # 116

Which type of security feature stops vehicles from crashing through the doors of a building?

Options:

A.

Bollards

B.

Receptionist

C.

Mantrap

D.

Turnstile

Buy Now
Question # 117

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.

What kind of attack is Susan carrying on?

Options:

A.

A sniffing attack

B.

A spoofing attack

C.

A man-in-the-middle attack

D.

A denial of service attack

Buy Now
Question # 118

Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords.

Which of the following tools would not be useful for cracking the hashed passwords?

Options:

A.

John the Ripper

B.

Hashcat

C.

netcat

D.

THC-Hydra

Buy Now
Question # 119

Given below are different steps involved in the vulnerability-management life cycle:

Remediation

Identify assets and create a baseline

Verification

Monitor

Vulnerability scan

Risk assessment

Identify the correct sequence of steps involved in vulnerability management.

Options:

A.

2 → 5 → 6 → 1 → 3 → 4

B.

2 → 1 → 5 → 6 → 4 → 3

C.

2 → 4 → 5 → 3 → 6 → 1

D.

1 → 2 → 3 → 4 → 5 → 6

Buy Now
Question # 120

Which of the following are well-known password-cracking programs?

Options:

A.

L0phtcrack

B.

NetCat

C.

Jack the Ripper

D.

Netbus

E.

John the Ripper

Buy Now
Question # 121

Judy created a forum, one day. she discovers that a user is posting strange images without writing comments.

She immediately calls a security expert, who discovers that the following code is hidden behind those images:

What issue occurred for the users who clicked on the image?

Options:

A.

The code inject a new cookie to the browser.

B.

The code redirects the user to another site.

C.

The code is a virus that is attempting to gather the users username and password.

D.

This php file silently executes the code and grabs the users session cookie and session ID.

Buy Now
Question # 122

jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

Options:

A.

Wireless sniffing

B.

Piggybacking

C.

Evil twin

D.

Wardriving

Buy Now
Question # 123

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

Options:

A.

 Session hijacking

B.

 Firewalking

C.

 Man-in-the-middle attack

D.

 Network sniffing

Buy Now
Exam Code: 312-50v13
Exam Name: Certified Ethical Hacker Exam (CEHv13)
Last Update: Jun 15, 2025
Questions: 568
312-50v13 pdf

312-50v13 PDF

$29.75  $84.99
312-50v13 Engine

312-50v13 Testing Engine

$33.25  $94.99
312-50v13 PDF + Engine

312-50v13 PDF + Testing Engine

$47.25  $134.99