EC-Council 312-50v13 Certified Ethical Hacker Exam (CEHv13) Online Training
EC-Council 312-50v13 Online Training
The questions for 312-50v13 were last updated at Feb 20,2025.
- Exam Code: 312-50v13
- Exam Name: Certified Ethical Hacker Exam (CEHv13)
- Certification Provider: EC-Council
- Latest update: Feb 20,2025
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?
- A . Traffic is Blocked on UDP Port 53
- B . Traffic is Blocked on TCP Port 80
- C . Traffic is Blocked on TCP Port 54
- D . Traffic is Blocked on UDP Port 80
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?
- A . Traffic is Blocked on UDP Port 53
- B . Traffic is Blocked on TCP Port 80
- C . Traffic is Blocked on TCP Port 54
- D . Traffic is Blocked on UDP Port 80
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
- A . Kismet
- B . Abel
- C . Netstumbler
- D . Nessus
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
- A . Kismet
- B . Abel
- C . Netstumbler
- D . Nessus
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
- A . Kismet
- B . Abel
- C . Netstumbler
- D . Nessus
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
- A . Kismet
- B . Abel
- C . Netstumbler
- D . Nessus
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
- A . Kismet
- B . Abel
- C . Netstumbler
- D . Nessus
Attacker creates a transparent ‘iframe’ in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the ‘Do you want to make $1000 in a day?’ URL but actually he/she clicks to the content or URL that exists in the transparent ‘iframe’ which is setup by the attacker.
What is the name of the attack which is mentioned in the scenario?
- A . Session Fixation
- B . HTML Injection
- C . HTTP Parameter Pollution
- D . Clickjacking Attack
A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server’s access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server’s software. The “ps” command shows that the “nc” file is running as process, and the netstat command shows the “nc” process is listening on a network port.
What kind of vulnerability must be present to make this remote attack possible?
- A . File system permissions
- B . Privilege escalation
- C . Directory traversal
- D . Brute force login
Which method of password cracking takes the most time and effort?
- A . Dictionary attack
- B . Shoulder surfing
- C . Rainbow tables
- D . Brute force