This page was exported from Actual Test Materials [ http://blog.actualtests4sure.com ]
Export date: Sun Mar 9 15:01:52 2025 / +0000 GMT

CEH v13 Certification 312-50v13 Sample Questions Reliable [Q323-Q342]




CEH v13 Certification 312-50v13 Sample Questions Reliable

Prepare for the Actual CEH v13 312-50v13 Exam Practice Materials Collection

Q323. When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the “TCP three-way handshake.” While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?

 
 
 
 

Q324. Windows LAN Manager (LM) hashes are known to be weak.
Which of the following are known weaknesses of LM? (Choose three.)

 
 
 
 

Q325. Which file is a rich target to discover the structure of a website during web-server footprinting?

 
 
 
 

Q326. Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect honeypots?

 
 
 
 

Q327. Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities. During analysis, he found that these issues are not true vulnerabilities.
What will you call these issues?

 
 
 
 

Q328. Attacker Lauren has gained the credentials of an organization’s internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited. What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?

 
 
 
 

Q329. Which Nmap switch helps evade IDS or firewalls?

 
 
 
 

Q330. Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?

 
 
 
 

Q331. What is the minimum number of network connections in a multi homed firewall?

 
 
 
 

Q332. You are attempting to crack LM Manager hashed from Windows 2000 SAM file. You will be using LM Brute force hacking tool for decryption. What encryption algorithm will you be decrypting?

 
 
 
 

Q333. Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool “SIDExtractor”. Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges.

 
 
 
 
 
 
 

Q334. Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

 
 
 
 

Q335. Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script.
After infecting the victim’s device. Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self- extracting RAR file, to retrieve information related to network resources such as writable share drives. What is the tool employed by Mason in the above scenario?

 
 
 
 

Q336. While testing a web application in development, you notice that the web server does not properly ignore the
“dot dot slash” (../) character string and instead returns the file listing of a folder structure of the server.
What kind of attack is possible in this scenario?

 
 
 
 

Q337. What did the following commands determine?

 
 
 
 
 

Q338. Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevent hackers from decrypting the data flow between the endpoints. What is the technique followed by Peter to send files securely through a remote connection?

 
 
 
 

Q339. Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

 
 
 
 

Q340. The collection of potentially actionable, overt, and publicly available information is known as

 
 
 
 

Q341. The network team has well-established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it. What would be a good step to have in the procedures for a situation like this?

 
 
 
 

Q342. Ben purchased a new smartphone and received some updates on it through the OTA method. He received two messages: one with a PIN from the network operator and another asking him to enter the PIN received from the operator. As soon as he entered the PIN, the smartphone started functioning in an abnormal manner. What is the type of attack performed on Ben in the above scenario?

 
 
 
 

Ace ECCouncil 312-50v13 Certification with Actual Questions Feb 26, 2025 Updated: https://www.actualtests4sure.com/312-50v13-test-questions.html

Post date: 2025-02-26 11:49:36
Post date GMT: 2025-02-26 11:49:36
Post modified date: 2025-02-26 11:49:36
Post modified date GMT: 2025-02-26 11:49:36