Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CEH v13 312-50v13 Syllabus Exam Questions Answers

Page: 22 / 65
Total 873 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 85

An attacker gained escalated privileges on a critical server. What should be done FIRST to contain the threat with minimal disruption?

Options:

A.

Engage a forensic team immediately

B.

Power down the server and isolate it

C.

Monitor, analyze, and then isolate the server

D.

Conduct a vulnerability scan on all servers

Question 86

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

Options:

A.

ACK flag probe scanning

B.

ICMP Echo scanning

C.

SYN/FIN scanning using IP fragments

D.

IPID scanning

Question 87

As a Certified Ethical Hacker assessing session management vulnerabilities in a secure web application using MFA, encrypted cookies, and a WAF, which technique would most effectively exploit a session management weakness while bypassing these defenses?

Options:

A.

Utilizing Session Fixation to force a victim to use a known session ID

B.

Executing a Cross-Site Request Forgery (CSRF) attack

C.

Exploiting insecure deserialization vulnerabilities for code execution

D.

Conducting Session Sidejacking using captured session tokens

Question 88

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

Options:

A.

He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.

B.

He will activate OSPF on the spoofed root bridge.

C.

He will repeat this action so that it escalates to a DoS attack.

D.

He will repeat the same attack against all L2 switches of the network.

Page: 22 / 65
Total 873 questions