Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pearson 312-50v13 New Attempt

Page: 23 / 65
Total 873 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 89

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

[Note: Since the log extract is not shown in your message, we must rely on common indicators in similar scenarios.]

If the log shows paths such as:

Then the correct answer is:

Options:

A.

C:\WINNT\system32\config\SAM

B.

or access to Repair\SAM or Repair\system

C.

or related command lines accessing registry hives

Question 90

Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different. What type of attack he is experiencing?.

Options:

A.

Dos attack

B.

DHCP spoofing

C.

ARP cache poisoning

D.

DNS hijacking

Question 91

A certified ethical hacker is conducting a Whois footprinting activity on a specific domain. The individual is leveraging various tools such as Batch IP Converter and Whols Analyzer Pro to retrieve vital details but is unable to gather complete Whois information from the registrar for a particular set of data. As the hacker, what might be the probable data model being utilized by the domain's registrar for storing and looking up

Who is information?

Options:

A.

Thick Whois model with a malfunctioning server

B.

Thick Whois model working correctly

C.

Thin Whois model with a malfunctioning server

D.

Thin Whois model working correctly

Question 92

You discover a Web API integrated with webhooks and an existing administrative web shell. Your objective is to compromise the system while leaving minimal traces. Which technique is most effective?

Options:

A.

SSRF to perform unauthorized API calls

B.

IDOR exploitation

C.

Upload malicious scripts via the web shell

D.

Manipulate the webhook for unintended data transfer

Page: 23 / 65
Total 873 questions