EC-Council 312-50v13 Certified Ethical Hacker Exam (CEHv13) Online Training
EC-Council 312-50v13 Online Training
The questions for 312-50v13 were last updated at Feb 21,2025.
- Exam Code: 312-50v13
- Exam Name: Certified Ethical Hacker Exam (CEHv13)
- Certification Provider: EC-Council
- Latest update: Feb 21,2025
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?
- A . White Hat
- B . Suicide Hacker
- C . Gray Hat
- D . Black Hat
During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.
What is this type of DNS configuration commonly called?
- A . DynDNS
- B . DNS Scheme
- C . DNSSEC
- D . Split DNS
What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?
- A . Behavioral based
- B . Heuristics based
- C . Honeypot based
- D . Cloud based
Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?
- A . tcptrace
- B . Nessus
- C . OpenVAS
- D . tcptraceroute
What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?
- A . Session hijacking
- B . Firewalking
- C . Man-in-the middle attack
- D . Network sniffing
Which of the following is not a Bluetooth attack?
- A . Bluedriving
- B . Bluesmacking
- C . Bluejacking
- D . Bluesnarfing
What is the role of test automation in security testing?
- A . It is an option but it tends to be very expensive.
- B . It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.
- C . Test automation is not usable in security due to the complexity of the tests.
- D . It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.
Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.
What should you do?
- A . Confront the client in a respectful manner and ask her about the data.
- B . Copy the data to removable media and keep it in case you need it.
- C . Ignore the data and continue the assessment until completed as agreed.
- D . Immediately stop work and contact the proper legal authorities.
While using your bank’s online servicing you notice the following string in the URL bar:
“http: // www. MyPersonalBank. com/ account?id=368940911028389&Damount=10980&Camount=21”
You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflects the changes.
Which type of vulnerability is present on this site?
- A . Cookie Tampering
- B . SQL Injection
- C . Web Parameter Tampering
- D . XSS Reflection
The establishment of a TCP connection involves a negotiation called three-way handshake.
What type of message does the client send to the server in order to begin this negotiation?
- A . ACK
- B . SYN
- C . RST
- D . SYN-ACK