EC-Council 312-50v13 Certified Ethical Hacker Exam (CEHv13) Online Training
EC-Council 312-50v13 Online Training
The questions for 312-50v13 were last updated at Feb 20,2025.
- Exam Code: 312-50v13
- Exam Name: Certified Ethical Hacker Exam (CEHv13)
- Certification Provider: EC-Council
- Latest update: Feb 20,2025
What is not a PCI compliance recommendation?
- A . Use a firewall between the public network and the payment card data.
- B . Use encryption to protect all transmission of card holder data over any public network.
- C . Rotate employees handling credit card transactions on a yearly basis to different departments.
- D . Limit access to card holder data to as few individuals as possible.
What is not a PCI compliance recommendation?
- A . Use a firewall between the public network and the payment card data.
- B . Use encryption to protect all transmission of card holder data over any public network.
- C . Rotate employees handling credit card transactions on a yearly basis to different departments.
- D . Limit access to card holder data to as few individuals as possible.
What is not a PCI compliance recommendation?
- A . Use a firewall between the public network and the payment card data.
- B . Use encryption to protect all transmission of card holder data over any public network.
- C . Rotate employees handling credit card transactions on a yearly basis to different departments.
- D . Limit access to card holder data to as few individuals as possible.
What is not a PCI compliance recommendation?
- A . Use a firewall between the public network and the payment card data.
- B . Use encryption to protect all transmission of card holder data over any public network.
- C . Rotate employees handling credit card transactions on a yearly basis to different departments.
- D . Limit access to card holder data to as few individuals as possible.
What is not a PCI compliance recommendation?
- A . Use a firewall between the public network and the payment card data.
- B . Use encryption to protect all transmission of card holder data over any public network.
- C . Rotate employees handling credit card transactions on a yearly basis to different departments.
- D . Limit access to card holder data to as few individuals as possible.
What is the minimum number of network connections in a multihomed firewall?
- A . 3
- B . 5
- C . 4
- D . 2
Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has decreased to 10%. The risk threshold for the application is 20%.
Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?
- A . Accept the risk
- B . Introduce more controls to bring risk to 0%
- C . Mitigate the risk
- D . Avoid the risk
You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet.
What is the recommended architecture in terms of server placement?
- A . All three servers need to be placed internally
- B . A web server facing the Internet, an application server on the internal network, a database server on the internal network
- C . A web server and the database server facing the Internet, an application server on the internal network
- D . All three servers need to face the Internet so that they can communicate between themselves
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines.
Which one of the following tools the hacker probably used to inject HTML code?
- A . Wireshark
- B . Ettercap
- C . Aircrack-ng
- D . Tcpdump
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
- A . ESP transport mode
- B . ESP confidential
- C . AH permiscuous
- D . AH Tunnel mode