Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-50v13 Exam Dumps - ECCouncil CEH v13 Questions and Answers

Question # 109

A technology consulting firm in Portland, Oregon began experiencing repeated topology recalculations across its switching infrastructure. Shortly after a newly connected device came online in a conference room, spanning-tree convergence events were triggered across multiple distribution switches. Engineers determined that the access-layer interface connected to that device was influencing path-selection decisions, introducing a more favorable bridge priority value into the environment and affecting the established hierarchy. To preserve the intended switching structure and prevent unauthorized devices from altering root selection decisions, which control should be employed?

Options:

A.

Configuring Loop Guard on non-designated ports

B.

Activating UDLD (Unidirectional Link Detection) on uplinks

C.

Applying Root Guard on designated interfaces

D.

Enabling BPDU Guard on edge ports

Buy Now
Question # 110

During a security assessment of a cloud-hosted application using SOAP-based web services, a red team operator intercepts a valid SOAP request, duplicates the signed message body, inserts it into the same envelope, and forwards it. Due to improper validation, the server accepts the duplicated body and executes unauthorized code. What type of attack does this represent?

Options:

A.

Cloud snooper attack

B.

Cryptanalysis attack

C.

Wrapping attack

D.

IMDS abuse

Buy Now
Question # 111

An attacker is analyzing traffic from a mobile app and finds that sensitive data like session tokens are being transmitted over HTTP instead of HTTPS. The attacker plans to intercept and manipulate the data during transmission. Which vulnerability is the attacker exploiting?

Options:

A.

Security Misconfiguration

B.

Improper SSL Pinning

C.

Insecure Communication

D.

Insufficient Input Validation

Buy Now
Question # 112

At a cybersecurity consultancy firm in Boston, senior analyst Amanda Liu is called in to assess a malware outbreak affecting a regional healthcare provider. Despite using updated antivirus tools, the security team notices inconsistent detection across infected endpoints. Amanda discovers that while the malicious behavior is consistent, system file tampering and suspicious outbound traffic, each malware sample has a slightly different code structure and fails traditional hash-based comparison. Static analysis reveals that the underlying logic remains unchanged, but the code patterns vary unpredictably across infections. What type of virus is most likely responsible for this behavior?

Options:

A.

Cavity virus

B.

Macro virus

C.

Polymorphic virus

D.

Stealth virus

Buy Now
Question # 113

A financial services firm is experiencing a sophisticated DoS attack on their DNS servers using DNS amplification and on their web servers using HTTP floods. Traditional firewall rules and IDS are failing to mitigate the attack effectively. To protect their infrastructure without impacting legitimate users, which advanced mitigation strategy should the firm implement?

Options:

A.

Increase server capacity and implement simple rate limiting

B.

Block all incoming traffic from suspicious IP ranges using access control lists

C.

Deploy a Web Application Firewall (WAF) to filter HTTP traffic

D.

Utilize a cloud-based DDoS protection service with traffic scrubbing capabilities

Buy Now
Question # 114

A malware analyst finds JavaScript and /OpenAction keywords in a suspicious PDF using pdfid. What should be the next step to assess the potential impact?

Options:

A.

Upload the file to VirusTotal

B.

Extract and analyze stream objects using PDFStreamDumper

C.

Compute file hashes for signature matching

Buy Now
Question # 115

While testing a web application that relies on JavaScript-based client-side security controls, which method is most effective for bypassing these controls without triggering server-side alerts?

Options:

A.

Reverse-engineering the proprietary encryption algorithm

B.

Disabling JavaScript in the browser and submitting invalid data

C.

Injecting malicious JavaScript into the login page

D.

Using a proxy tool to intercept and modify client-side requests

Buy Now
Question # 116

In Seattle, Washington, ethical hacker Mia Chen is tasked with testing the network defenses of Pacific Shipping Co., a major logistics firm. During her penetration test, Mia targets the company ' s external-facing web server, which handles customer tracking requests. She observes that the security system filtering traffic to this server analyzes incoming SSH and DNS requests to block unauthorized access attempts. Mia plans to craft specific payloads to bypass this system to expose vulnerabilities to the IT department.

Which security system is Mia attempting to bypass during her penetration test of Pacific Shipping Co. ' s web server?

Options:

A.

Stateful Multilayer Inspection Firewall

B.

Application-Level Firewall

C.

Packet Filtering Firewall

D.

Circuit-Level Gateway Firewall

Buy Now
Question # 117

Customer data in a cloud environment was exposed due to an unknown vulnerability. What is the most likely cause?

Options:

A.

Misconfigured security groups

B.

Brute force attack

C.

DoS attack

D.

Side-channel attack

Buy Now
Question # 118

In Miami, Florida, Sarah Thompson, a security analyst at Apex Cyber Defense, is tasked with monitoring the wireless infrastructure at Coastal Healthcare, a busy urban hospital. One morning, nurse Emily Carter reports that her tablet used for accessing patient records is unexpectedly connecting to an access point broadcasting a name and signal similar to the hospital’s secure Wi-Fi. Upon investigation, Sarah’s log analysis reveals an unauthorized device on the network capturing sensitive traffic from connected systems. Suspecting a breach, she identifies that the attacker has deployed an access point to mimic the hospital’s legitimate network.

Based on this behavior, which wireless threat is the attacker executing?

Options:

A.

Misconfigured AP

B.

Rogue AP

C.

Evil Twin AP

D.

Honeypot AP

Buy Now
Question # 119

As a newly appointed network security analyst, you are tasked with ensuring that the organization’s network can detect and prevent evasion techniques used by attackers. One commonly used evasion technique is packet fragmentation, which is designed to bypass intrusion detection systems (IDS). Which IDS configuration should be implemented to effectively counter this technique?

Options:

A.

Implementing an anomaly-based IDS that can detect irregular traffic patterns caused by packet fragmentation.

B.

Adjusting the IDS to recognize regular intervals at which fragmented packets are sent.

C.

Configuring the IDS to reject all fragmented packets to eliminate the risk.

D.

Employing a signature-based IDS that recognizes the specific signature of fragmented packets.

Buy Now
Question # 120

During a physical penetration test simulating a social engineering attack, a threat actor walks into the lobby of a target organization dressed as a field technician from a known external vendor. Carrying a fake ID badge and referencing a known company name, the attacker confidently claims they’ve been dispatched to perform a routine server room upgrade. Using internal-sounding terminology and referencing real employee names gathered via OSINT, the individual conveys urgency. The receptionist, recognizing the vendor name and the convincing language, allows access without verifying the credentials.

Options:

A.

Perceived authority and reliance on third-party familiarity

B.

Leaked credentials on public networks and forums

C.

Trust in physical security logs used by security teams

D.

Misconfigured network segmentation allowing unauthorized access

Buy Now
Question # 121

In Denver, Colorado, ethical hacker Rachel Nguyen is conducting a network security assessment for Apex Logistics, a transportation firm with a complex internal network. During her test, Rachel observes a client-server communication and injects specially crafted packets into the exchange, disrupting the client’s session. As a result, the server continues interacting with Rachel’s system while the legitimate client’s connection becomes unresponsive. She uses this setup in a controlled environment to demonstrate vulnerabilities to the company’s IT team.

What network-level session hijacking technique is Rachel employing in this assessment?

Options:

A.

Blind hijacking

B.

UDP hijacking

C.

RST hijacking

D.

TCP/IP hijacking

Buy Now
Question # 122

A penetration tester is conducting a security assessment for a client and needs to capture sensitive information transmitted across multiple VLANs without being detected by the organization ' s security monitoring systems. The network employs strict VLAN segmentation and port security measures. Which advanced sniffing technique should the tester use to discreetly intercept and analyze traffic across all VLANs?

Options:

A.

Deploy a rogue DHCP server to redirect network traffic

B.

Exploit a VLAN hopping vulnerability to access multiple VLANs

C.

Implement switch port mirroring on all VLANs

D.

Use ARP poisoning to perform a man-in-the-middle attack

Buy Now
Question # 123

A future-focused security audit discusses risks where attackers collect encrypted data today, anticipating they will be able to decrypt it later using quantum computers. What is this threat commonly known as?

Options:

A.

Saving data today for future quantum decryption

B.

Breaking RSA using quantum algorithms

C.

Flipping qubit values to corrupt output

D.

Replaying intercepted quantum messages

Buy Now
Exam Code: 312-50v13
Exam Name: Certified Ethical Hacker Exam (CEHv13)
Last Update: Mar 15, 2026
Questions: 584
312-50v13 pdf

312-50v13 PDF

$25.5  $84.99
312-50v13 Engine

312-50v13 Testing Engine

$28.5  $94.99
312-50v13 PDF + Engine

312-50v13 PDF + Testing Engine

$40.5  $134.99