Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECCouncil 312-50v13 Online Access

Page: 36 / 44
Total 584 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 141

While analyzing suspicious network activity, you observe a slow, stealthy scanning technique that is difficult to trace back to the attacker. Which scenario best describes the scanning technique being used?

Options:

A.

The attacker sends FIN packets to infer port states based on responses

B.

The attacker uses a “zombie” machine to perform scans, hiding their true identity

C.

The attacker performs full TCP connect scans on all ports

D.

The attacker sends packets with all TCP flags set

Question 142

You perform a network scan using ICMP Echo Requests and observe that certain IP addresses do not return Echo Replies, while other network services remain functional. How should this situation be interpreted?

Options:

A.

The scanned IPs are unused and available for expansion

B.

The lack of replies indicates a major breach

C.

A firewall or security control is blocking ICMP Echo Requests

D.

The non-responsive IPs indicate severe congestion

Question 143

A serverless application was compromised through an insecure third-party API used by a function. What is the most effective countermeasure?

Options:

A.

Deploy a cloud-native security platform

B.

Enforce function-level least privilege permissions

C.

Use a CASB for third-party services

D.

Regularly update serverless functions

Question 144

As a newly appointed network security analyst, you are tasked with ensuring that the organization’s network can detect and prevent evasion techniques used by attackers. One commonly used evasion technique is packet fragmentation, which is designed to bypass intrusion detection systems (IDS). Which IDS configuration should be implemented to effectively counter this technique?

Options:

A.

Implementing an anomaly-based IDS that can detect irregular traffic patterns caused by packet fragmentation.

B.

Adjusting the IDS to recognize regular intervals at which fragmented packets are sent.

C.

Configuring the IDS to reject all fragmented packets to eliminate the risk.

D.

Employing a signature-based IDS that recognizes the specific signature of fragmented packets.

Page: 36 / 44
Total 584 questions