Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CEH v13 312-50v13 Updated Exam

Page: 11 / 44
Total 584 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 41

A web application returns generic error messages. The analyst submits AND 1=1 and AND 1=2 and observes different responses. What type of injection is being tested?

Options:

A.

UNION-based SQL injection

B.

Error-based SQL injection

C.

Boolean-based blind SQL injection

D.

Time-based blind SQL injection

Question 42

A cybersecurity team identifies suspicious outbound network traffic. Investigation reveals malware utilizing the Background Intelligent Transfer Service (BITS) to evade firewall detection. Why would attackers use this service to conceal malicious activities?

Options:

A.

Because BITS packets appear identical to normal Windows Update traffic.

B.

Because BITS operates exclusively through HTTP tunneling.

C.

Because BITS utilizes IP fragmentation to evade intrusion detection systems.

D.

Because BITS traffic uses encrypted DNS packets.

Question 43

In a highly secure online banking environment, customers report unauthorized access to their accounts despite robust authentication controls. Investigation reveals attackers are using advanced session hijacking techniques to perform fraudulent transactions. Which advanced session-hijacking attack, resembling a scenario-based attack, presents the greatest challenge to detect and mitigate?

Options:

A.

Covert Cross-Site Scripting (XSS) attack injecting malicious scripts into banking pages

B.

Man-in-the-Browser (MitB) attack using malicious browser extensions to intercept sessions

C.

Session fixation attack manipulating HTTP session identifiers

D.

Passive sniffing attack capturing encrypted session tokens over unsecured Wi-Fi

Question 44

During a security evaluation of a smart agriculture setup, an analyst investigates a cloud-managed irrigation controller. The device is found to transmit operational commands and receive firmware updates over unencrypted HTTP. Additionally, it lacks mechanisms to verify the integrity or authenticity of those updates. This vulnerability could allow an adversary to intercept communications or inject malicious firmware, leading to unauthorized control over the device ' s behavior or denial of essential functionality. Which IoT threat category does this situation best illustrate?

Options:

A.

Insecure default settings

B.

Insecure ecosystem interfaces

C.

Insufficient privacy protection

D.

Insecure network services

Page: 11 / 44
Total 584 questions