Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Download Latest 312-50v13 Questions

Page: 42 / 44
Total 584 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 165

An attacker examines differences in ciphertext outputs resulting from small changes in the input to deduce key patterns in a symmetric algorithm. What method is being employed?

Options:

A.

Differential cryptanalysis on input-output differences

B.

Timing attack to infer key bits based on processing time

C.

Brute-force attack to try every possible key

D.

Chosen-ciphertext attack to decrypt arbitrary ciphertexts

Question 166

A system administrator observes that several machines in the network are repeatedly sending out traffic to unknown IP addresses. Upon inspection, these machines were part of a coordinated spam campaign. What is the most probable cause?

Options:

A.

Keyloggers were harvesting user credentials

B.

Devices were enslaved into a botnet network

C.

Browsers were redirected to adware-injected sites

D.

Worms exploited zero-day vulnerabilities

Question 167

During a penetration test, you perform extensive DNS interrogation to gather intelligence about a target organization. Considering the inherent limitations of DNS-based reconnaissance, which of the following pieces of information cannot be directly obtained through DNS interrogation?

Options:

A.

The specific usernames and passwords used by the organization’s employees.

B.

The estimated geographical location of the organization’s servers derived from IP addresses.

C.

The subdomains associated with the organization’s primary internet domain.

D.

The IP addresses associated with the organization’s mail servers.

Question 168

Customer data in a cloud environment was exposed due to an unknown vulnerability. What is the most likely cause?

Options:

A.

Misconfigured security groups

B.

Brute force attack

C.

DoS attack

D.

Side-channel attack

Page: 42 / 44
Total 584 questions