EC-Council 312-50v13 Certified Ethical Hacker Exam (CEHv13) Online Training
EC-Council 312-50v13 Online Training
The questions for 312-50v13 were last updated at Feb 21,2025.
- Exam Code: 312-50v13
- Exam Name: Certified Ethical Hacker Exam (CEHv13)
- Certification Provider: EC-Council
- Latest update: Feb 21,2025
Which type of security feature stops vehicles from crashing through the doors of a building?
- A . Bollards
- B . Receptionist
- C . Mantrap
- D . Turnstile
The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it.
Which of the following options can be useful to ensure the integrity of the data?
- A . The CFO can use a hash algorithm in the document once he approved the financial statements
- B . The CFO can use an excel file with a password
- C . The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document
- D . The document can be sent to the accountant using an exclusive USB for that document
What is the purpose of a demilitarized zone on a network?
- A . To scan all traffic coming through the DMZ to the internal network
- B . To only provide direct access to the nodes within the DMZ and protect the network behind it
- C . To provide a place to put the honeypot
- D . To contain the network devices you wish to protect
Which of the following Linux commands will resolve a domain name into IP address?
- A . >host-t a hackeddomain.com
- B . >host-t ns hackeddomain.com
- C . >host -t soa hackeddomain.com
- D . >host -t AXFR hackeddomain.com
Shellshock allowed an unauthorized user to gain access to a server.
It affected many Internet-facing services, which OS did it not directly affect?
- A . Linux
- B . Unix
- C . OS X
- D . Windows
Which regulation defines security and privacy controls for Federal information systems and organizations?
- A . HIPAA
- B . EU Safe Harbor
- C . PCI-DSS
- D . NIST-800-53
What is a “Collision attack” in cryptography?
- A . Collision attacks try to get the public key
- B . Collision attacks try to break the hash into three parts to get the plaintext value
- C . Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key
- D . Collision attacks try to find two inputs producing the same hash
Which of the following tools can be used for passive OS fingerprinting?
- A . nmap
- B . tcpdump
- C . tracert
- D . ping
Which of the following describes the characteristics of a Boot Sector Virus?
- A . Modifies directory table entries so that directory entries point to the virus code instead of the actual program.
- B . Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.
- C . Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.
- D . Overwrites the original MBR and only executes the new virus code.
Your company was hired by a small healthcare provider to perform a technical assessment on the network.
What is the best approach for discovering vulnerabilities on a Windows-based computer?
- A . Use the built-in Windows Update tool
- B . Use a scan tool like Nessus
- C . Check MITRE.org for the latest list of CVE findings
- D . Create a disk image of a clean Windows installation