Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

312-50v13 Reviews Questions

Page: 40 / 44
Total 584 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 157

An Android device has an unpatched permission-handling flaw and updated antivirus. What is the most effective undetected exploitation approach?

Options:

A.

SMS phishing

B.

Rootkit installation

C.

Custom exploit with obfuscation

D.

Metasploit payload

Question 158

In downtown Chicago, Illinois, security analyst Mia Torres investigates a breach at Windy City Enterprises, a logistics firm running an Apache HTTP Server. The attacker exploited a known vulnerability in an outdated version, gaining unauthorized access to customer shipment data. Mia’s analysis reveals the server lacked recent security updates, leaving it susceptible to remote code execution. Determined to prevent future incidents, Mia recommends a strategy to the IT team to address this exposure.

Which approach should Mia recommend to secure Windy City Enterprises ' Apache HTTP Server against such vulnerabilities?

Options:

A.

Eliminate unnecessary files within the jar files

B.

Block all unnecessary ports, ICMP traffic, and unnecessary protocols such as NetBIOS and SMB

C.

Use a dedicated machine as a web server

D.

Conduct an extensive risk assessment to determine which segments of the network are most vulnerable or at high risk that need to be patched first

Question 159

You must map open ports and services while remaining stealthy and avoiding IDS detection. Which scanning technique is best?

Options:

A.

FIN Scan

B.

TCP Connect Scan

C.

ACK Scan

D.

Stealth Scan (SYN Scan)

Question 160

In Portland, Oregon, ethical hacker Olivia Harper is hired by Cascade Biotech to test the security of their research network. During her penetration test, she simulates an attack by sending malicious packets to a server hosting sensitive genetic data. To evade detection, she needs to understand the monitoring system deployed near the network’s perimeter firewall, which analyzes incoming and outgoing traffic for suspicious patterns across the entire subnet. Olivia’s goal is to bypass this system to highlight vulnerabilities for the security team.

Which security system is Olivia attempting to bypass during her penetration test of Cascade Biotech’s network?

Options:

A.

Network-Based Intrusion Detection System

B.

Host-Based Firewalls

C.

Network-Based Firewalls

D.

Host-Based Intrusion Detection System

Page: 40 / 44
Total 584 questions