Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Sure Pass Exam 312-50v13 PDF

Page: 21 / 44
Total 584 questions

Certified Ethical Hacker Exam (CEHv13) Questions and Answers

Question 81

A Nessus scan reveals a critical SSH vulnerability (CVSS 9.0) allowing potential remote code execution on a Linux server. What action should be immediately prioritized?

Options:

A.

Redirect SSH traffic to another server

B.

Treat the finding as a possible false positive

C.

Immediately apply vendor patches and reboot during scheduled downtime

D.

Temporarily isolate the affected server, conduct a forensic audit, and then patch

Question 82

A BLE attack captured LL_ENC_REQ and LL_ENC_RSP packets but not the LTK. What is the next step?

Options:

A.

Decrypt pcap using -o option

B.

Attack cannot continue without LTK

C.

Use hcitool inq

D.

Use Btlejacking

Question 83

A penetration tester detects malware on a system that secretly records all keystrokes entered by the user. What type of malware is this?

Options:

A.

Rootkit

B.

Ransomware

C.

Keylogger

D.

Worm

Question 84

You are Sofia Patel, an ethical hacker at Nexus Security Labs, hired to test the mobile device security of Bayview University in San Francisco, California. During your assessment, you are given an Android 11-based Samsung Galaxy Tab S6 with USB debugging disabled and OEM unlock restrictions in place. To simulate an attacker attempting to gain privileged access, you install a mobile application that exploits a system vulnerability to gain root access directly on the device without requiring a PC. This allows you to bypass OS restrictions and retrieve sensitive research data. Based on this method, which Android rooting tool are you using?

Options:

A.

Magisk Manager

B.

One Click Root

C.

KingoRoot

D.

RootMaster

Page: 21 / 44
Total 584 questions