EC-Council 312-50v13 Certified Ethical Hacker Exam (CEHv13) Online Training
EC-Council 312-50v13 Online Training
The questions for 312-50v13 were last updated at Feb 21,2025.
- Exam Code: 312-50v13
- Exam Name: Certified Ethical Hacker Exam (CEHv13)
- Certification Provider: EC-Council
- Latest update: Feb 21,2025
An attacker with access to the inside network of a small company launches a successful STP manipulation attack.
What will he do next?
- A . He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
- B . He will activate OSPF on the spoofed root bridge.
- C . He will repeat this action so that it escalates to a DoS attack.
- D . He will repeat the same attack against all L2 switches of the network.
You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD.
Which Linux-based tool can change any user’s password or activate disabled Windows accounts?
- A . John the Ripper
- B . SET
- C . CHNTPW
- D . Cain & Abel
What does a firewall check to prevent particular ports and applications from getting packets into an organization?
- A . Transport layer port numbers and application layer headers
- B . Presentation layer headers and the session layer port numbers
- C . Network layer headers and the session layer port numbers
- D . Application layer port numbers and the transport layer headers
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.
Which file does the attacker need to modify?
- A . Boot.ini
- B . Sudoers
- C . Networks
- D . Hosts
is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.
- A . DNSSEC
- B . Resource records
- C . Resource transfer
- D . Zone transfer
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?
- A . Preparation phase
- B . Containment phase
- C . Identification phase
- D . Recovery phase
The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the Central Processing Unit (CPU), rather than passing only the frames that the controller is intended to receive.
Which of the following is being described?
- A . Multi-cast mode
- B . Promiscuous mode
- C . WEM
- D . Port forwarding
A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.
What is the best security policy concerning this setup?
- A . Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.
- B . As long as the physical access to the network elements is restricted, there is no need for additional measures.
- C . There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.
- D . The operator knows that attacks and down time are inevitable and should have a backup site.
PGP, SSL, and IKE are all examples of which type of cryptography?
- A . Digest
- B . Secret Key
- C . Public Key
- D . Hash Algorithm
Peter is surfing the internet looking for information about DX Company.
Which hacking process is Peter doing?
- A . Scanning
- B . Footprinting
- C . Enumeration
- D . System Hacking