New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CEH v13 312-50v13 Exam Questions and Answers PDF

Page: 2 / 51
Total 693 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 5

What is the following command used for?

net use \target\ipc$ "" /u:""

Options:

A.

Grabbing the etc/passwd file

B.

Grabbing the SAM

C.

Connecting to a Linux computer through Samba.

D.

This command is used to connect as a null session

E.

Enumeration of Cisco routers

Question 6

When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?

Options:

A.

False negative

B.

True negative

C.

True positive

D.

False positive

Question 7

A penetration tester gains access to a target system through a vulnerability in a third-party software application. What is the most effective next step to take to gain full control over the system?

Options:

A.

Conduct a denial-of-service (DoS) attack to disrupt the system’s services

B.

Execute a Cross-Site Request Forgery (CSRF) attack to steal session data

C.

Perform a brute-force attack on the system's root password

D.

Use a privilege escalation exploit to gain administrative privileges on the system

Question 8

John, a security analyst working for an organization, found a critical vulnerability on the organization's LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later.

What would John be considered as?

Options:

A.

Cybercriminal

B.

Black hat

C.

White hat

D.

Gray hat

Page: 2 / 51
Total 693 questions