Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Complete 312-50v13 ECCouncil Materials

Page: 17 / 44
Total 584 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 65

During a routine software update at Horizon Solutions, a mid-sized IT firm in Raleigh, North Carolina, an employee downloads a file utility from a popular third-party site to streamline document processing. During the installation, the user is prompted to install an optional “productivity toolbar” and a “system optimization tool,” which are bundled with vague descriptions. Shortly after, the employee notices intermittent pop-up ads, an altered browser homepage, and sluggish PC performance, though network logs also show occasional unexplained data transfers during off-hours. A security scan flags the additional programs as potentially harmful, but a deeper analysis reveals no immediate file encryption or self-replicating code.

What type of threat are these unwanted programs most likely classified as?

Options:

A.

Potentially Unwanted Applications (PUAs)

B.

Worms

C.

Botnet agents

D.

Logic bombs

Question 66

Why is using Google Hacking justified during passive footprinting?

Options:

A.

Identifying weaknesses in website source code

B.

Locating phishing sites mimicking the organization

C.

Mapping internal network structures

D.

Discovering hidden organizational data indexed by search engines

Question 67

During an external assessment of a healthcare insurance company in Houston, a penetration tester identifies a service running on TCP port 389. When queried, the service accepts anonymous binds and reveals directory data. By structuring his search filter, the tester is able to obtain usernames, departmental details, and organizational units. This information could potentially be used for targeted password attacks or privilege escalation.

Which classification best describes this enumeration activity?

Options:

A.

SMTP Enumeration

B.

DNS Enumeration

C.

LDAP Enumeration

D.

NTP Enumeration

Question 68

During a security assessment of a fintech startup in San Francisco, ethical hacker Michael analyzes the company ' s cloud platform. He observes that the system automates deployment, scaling, service discovery, and workload management across multiple nodes, ensuring smooth operation of critical services without requiring manual coordination. Which Kubernetes capability is primarily responsible for these functions?

Options:

A.

Kube-controller-manager

B.

Self-healing

C.

Container orchestration

D.

Container vulnerabilities

Page: 17 / 44
Total 584 questions