Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECCouncil 312-50v13 Online Access

Page: 36 / 65
Total 873 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 141

A security researcher reviewing an organization's website source code finds references to Amazon S3 file locations. What is the most effective way to identify additional publicly accessible S3 bucket URLs used by the target?

Options:

A.

Exploit XSS to force the page to reveal the S3 links

B.

Use Google advanced search operators to enumerate S3 bucket URLs

C.

Use SQL injection to extract internal file paths from the database

D.

Perform packet sniffing to intercept internal S3 bucket names

Question 142

Joseph was the Web site administrator for the Mason Insurance in New York, whose main website was located at Joseph uses his laptop computer regularly to administer the website. One night, Joseph received an urgent phone call from his friend, Smith. According to Smith, the main Mason Insurance website had been vandalized! All of its normal content was removed and replaced with an attacker’s message:

“H@cker Mess@ge: Y0u @re De@d! Fre@ks!”

From his office network (internal), Joseph saw the normal site. But from an external DSL connection, users saw the defaced site. Joseph checked the web server with Tripwire and found no system file or content change.

How did the attacker accomplish this hack?

Options:

A.

ARP spoofing

B.

SQL injection

C.

DNS poisoning

D.

Routing table injection

Question 143

As an IT technician in a small software development company, you are responsible for protecting the network against various cyber threats. You learn that attackers often try to bypass firewalls. Which of the following is a common technique used by attackers to evade firewall detection?

Options:

A.

Changing the source IP address of packets to make traffic appear to originate from a trusted source

B.

Using encrypted communication channels to evade network monitoring tools

C.

Using social engineering techniques to trick employees into revealing sensitive information

D.

Implementing an open-source operating system to bypass proprietary software restrictions

Question 144

To create a botnet. the attacker can use several techniques to scan vulnerable machines. The attacker first collects Information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list Is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.

Which technique is discussed here?

Options:

A.

Hit-list-scanning technique

B.

Topological scanning technique

C.

Subnet scanning technique

D.

Permutation scanning technique

Page: 36 / 65
Total 873 questions