Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free Access ECCouncil 312-50v13 New Release

Page: 32 / 44
Total 584 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 125

During an external security review of a manufacturing firm in Detroit, Michigan, you ' re asked to prioritize patch baselines for internet-facing servers without logging in or establishing full sessions. To achieve this, you analyze network-level responses and capture application output in order to determine the underlying system and its software release. Which technique best fits this objective?

Options:

A.

Service Version Discovery

B.

Port Scanning

C.

OS Discovery

D.

Vulnerability Scanning

Question 126

During a red team engagement at a retail company in Atlanta, ethical hacker James crafts a session with the company ' s shopping portal and deliberately shares that session ID with an unsuspecting employee by embedding it in a link. When the employee clicks and logs in, their activity is bound to the attacker ' s pre-assigned session. Later, James retrieves the employee ' s input from that same session to demonstrate the flaw to management.

Which session hijacking technique is James most likely using?

Options:

A.

Session Donation Attack

B.

Session Replay Attack

C.

Session Prediction

D.

Session Fixation Attack

Question 127

A penetration tester discovers that a system is infected with malware that encrypts all files and demands payment for decryption. What type of malware is this?

Options:

A.

Worm

B.

Spyware

C.

Keylogger

D.

Ransomware

Question 128

Encrypted session tokens vary in length, indicating inconsistent encryption strength. What is the best mitigation?

Options:

A.

Rotate keys frequently

B.

Enforce MFA for privileged users

C.

Implement uniform encryption strength

D.

Centralized logging

Page: 32 / 44
Total 584 questions