Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected 312-50v13 CEH v13 Questions Answers

Page: 5 / 44
Total 584 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 17

Dr. Evelyn Reed, a cybersecurity expert, was called in to investigate a series of unusual activities at " Global Innovations Inc. " The first red flag was a surge in spear-phishing emails targeting senior management, disguised as urgent internal memos. Soon after, the company ' s web server showed unexpected outbound traffic to unfamiliar IP addresses. A network audit revealed that multiple underutilized printers and routers had unauthorized firmware installed. Further review uncovered inconsistencies in file access logs linked to the R & D department, including unusually large data transfers occurring during non-business hours. Dr. Reed also noted the attackers appeared to have intimate knowledge of the organization ' s internal data structure.

Which phase of the Advanced Persistent Threat (APT) lifecycle is Global Innovations Inc. most likely experiencing, given the combination of these incidents?

Options:

A.

Initial Intrusion

B.

Expansion

C.

Search and Exfiltration

D.

Persistence

Question 18

Why is NTP responding with internal IP addresses and hostnames?

Options:

A.

TCP fallback abuse

B.

DNS poisoning

C.

Honeypot redirection

D.

Misconfigured NTP daemon allowing external queries

Question 19

At Pinnacle Financial Services in Chicago, Illinois, ethical hacker Sarah Thompson is conducting a penetration test to evaluate the security of the company ' s online banking portal. During her assessment, Sarah positions herself on the internal network and uses a sniffer to capture traffic between a user’s browser and the banking server. She quietly collects session data, including user IDs and authentication tokens, without interfering with the ongoing communication. Later, she plans to use this information to impersonate a legitimate user in a controlled test environment to demonstrate potential risk to the bank’s IT team.

What type of session hijacking is Sarah performing during this phase of her penetration test?

Options:

A.

Session Fixation Attack

B.

Active Session Hijacking

C.

Man-in-the-browser Attack

D.

Passive Session Hijacking

Question 20

While assessing a web server, a tester sends malformed HTTP requests and compares responses to identify the server type and version. What technique is being employed?

Options:

A.

Fingerprinting server identity using banner-grabbing techniques

B.

Sending phishing emails to extract web server login credentials

C.

Conducting session fixation using malformed cookie headers

D.

Injecting scripts into headers for persistent XSS attacks

Page: 5 / 44
Total 584 questions