Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

All 312-50v13 Test Inside ECCouncil Questions

Page: 7 / 65
Total 873 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 25

Ethical hacker jane Smith is attempting to perform an SQL injection attach. She wants to test the response time of a true or false response and wants to use a second command to determine whether the database will return true or false results for user IDs. which two SQL Injection types would give her the results she is looking for?

Options:

A.

Out of band and boolean-based

B.

Time-based and union-based

C.

union-based and error-based

D.

Time-based and boolean-based

Question 26

A penetration tester evaluates an industrial control system (ICS) that manages critical infrastructure. The tester discovers that the system uses weak default passwords for remote access. What is the most effective method to exploit this vulnerability?

Options:

A.

Perform a brute-force attack to guess the system's default passwords

B.

Execute a Cross-Site Request Forgery (CSRF) attack to manipulate system settings

C.

Conduct a denial-of-service (DoS) attack to disrupt the system temporarily

D.

Use the default passwords to gain unauthorized access to the ICS and control system operations

Question 27

Fleet vehicles with smart locking systems were compromised after attackers captured unique signals from key fobs. What should the security team prioritize to confirm and prevent this attack?

Options:

A.

Secure firmware updates

B.

Increase physical surveillance

C.

Deploy anti-malware on smartphones

D.

Monitor wireless signals for jamming or interference

Question 28

You are a security analyst conducting a footprinting exercise for a new client to gather information without direct interaction. After using search engines and public databases, you consider using Google Hacking (Google Dorking) techniques to uncover further vulnerabilities. Which option best justifies this decision?

Options:

A.

Google Hacking can help locate phishing websites that mimic the client’s website.

B.

Google Hacking can help discover hidden organizational data from the Deep Web.

C.

Google Hacking can help identify weaknesses in the client’s website code.

D.

Google Hacking can assist in mapping the client’s internal network structure.

Page: 7 / 65
Total 873 questions