Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECCouncil CEH v13 312-50v13 New Questions

Page: 6 / 65
Total 873 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 21

A penetration tester is hired by a company to assess its vulnerability to social engineering attacks targeting its IT department. The tester decides to use a sophisticated pretext involving technical jargon and insider information to deceive employees into revealing their network credentials. What is the most effective social engineering technique the tester should employ to maximize the chances of obtaining valid credentials without raising suspicion?

Options:

A.

Conduct a phone call posing as a high-level executive requesting urgent password resets

B.

Send a generic phishing email with a malicious attachment to multiple employees

C.

Create a convincing fake IT support portal that mimics the company's internal systems

D.

Visit the office in person as a maintenance worker to gain physical access to terminals

Question 22

An organization uses SHA-256 for data integrity checks but still experiences unauthorized data modification. Which cryptographic tool can help resolve this issue?

Options:

A.

Asymmetric encryption

B.

SSL/TLS certificates

C.

Symmetric encryption

D.

Digital signatures

Question 23

which type of virus can change its own code and then cipher itself multiple times as it replicates?

Options:

A.

Stealth virus

B.

Tunneling virus

C.

Cavity virus

D.

Encryption virus

Question 24

A penetration tester is tasked with mapping an organization's network while avoiding detection by sophisticated intrusion detection systems (IDS). The organization employs advanced IDS capable of recognizing common scanning patterns. Which scanning technique should the tester use to effectively discover live hosts and open ports without triggering the IDS?

Options:

A.

Execute a FIN scan by sending TCP packets with the FIN flag set

B.

Use an Idle scan leveraging a third-party zombie host

C.

Conduct a TCP Connect scan using randomized port sequences

D.

Perform an ICMP Echo scan to ping all network devices

Page: 6 / 65
Total 873 questions