EC-Council 312-50v13 Certified Ethical Hacker Exam (CEHv13) Online Training
EC-Council 312-50v13 Online Training
The questions for 312-50v13 were last updated at Feb 21,2025.
- Exam Code: 312-50v13
- Exam Name: Certified Ethical Hacker Exam (CEHv13)
- Certification Provider: EC-Council
- Latest update: Feb 21,2025
Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]”.
Which statement below is true?
- A . This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.
- B . This is a scam because Bob does not know Scott.
- C . Bob should write to [email protected] to verify the identity of Scott.
- D . This is probably a legitimate message as it comes from a respectable organization.
env x=’(){ :;};echo exploit’ bash Cc ‘cat/etc/passwd’
What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?
- A . Removes the passwd file
- B . Changes all passwords in passwd
- C . Add new user to the passwd file
- D . Display passwd content to prompt
Which of the following is assured by the use of a hash?
- A . Authentication
- B . Confidentiality
- C . Availability
- D . Integrity
Which results will be returned with the following Google search query? site:target.com C site:Marketing.target.com accounting
- A . Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.
- B . Results matching all words in the query.
- C . Results for matches on target.com and Marketing.target.com that include the word “accounting”
- D . Results matching “accounting” in domain target.com but not on the site Marketing.target.com
Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted.
What is the name of the command used by SMTP to transmit email over TLS?
- A . OPPORTUNISTICTLS
- B . UPGRADETLS
- C . FORCETLS
- D . STARTTLS
In the field of cryptanalysis, what is meant by a “rubber-hose” attack?
- A . Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.
- B . A backdoor placed into a cryptographic algorithm by its creator.
- C . Extraction of cryptographic secrets through coercion or torture.
- D . Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.
You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.
What Wireshark filter will show the connections from the snort machine to kiwi syslog machine?
- A . tcp.srcport= = 514 && ip.src= = 192.168.0.99
- B . tcp.srcport= = 514 && ip.src= = 192.168.150
- C . tcp.dstport= = 514 && ip.dst= = 192.168.0.99
- D . tcp.dstport= = 514 && ip.dst= = 192.168.0.150
What two conditions must a digital signature meet?
- A . Has to be the same number of characters as a physical signature and must be unique.
- B . Has to be unforgeable, and has to be authentic.
- C . Must be unique and have special characters.
- D . Has to be legible and neat.
A company’s security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating.
What sort of security breach is this policy attempting to mitigate?
- A . Attempts by attackers to access the user and password information stored in the company’s SQL database.
- B . Attempts by attackers to access Web sites that trust the Web browser user by stealing the user’s authentication credentials.
- C . Attempts by attackers to access password stored on the user’s computer without the user’s knowledge.
- D . Attempts by attackers to determine the user’s Web browser usage patterns, including when sites were visited and for how long.
What is correct about digital signatures?
- A . A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.
- B . Digital signatures may be used in different documents of the same type.
- C . A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.
- D . Digital signatures are issued once for each user and can be used everywhere until they expire.