Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50v13 Certified Ethical Hacker Exam (CEHv13) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50v13 Practice Questions

Certified Ethical Hacker Exam (CEHv13)

Last Update 7 hours ago
Total Questions : 584

Dive into our fully updated and stable 312-50v13 practice test platform, featuring all the latest CEH v13 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CEH v13 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50v13. Use this test to pinpoint which areas you need to focus your study on.

312-50v13 PDF

312-50v13 PDF (Printable)
$43.75
$124.99

312-50v13 Testing Engine

312-50v13 PDF (Printable)
$50.75
$144.99

312-50v13 PDF + Testing Engine

312-50v13 PDF (Printable)
$63.7
$181.99
Question # 46

During a security assessment of an internal network, a penetration tester discovers that UDP port 123 is open, indicating that the NTP service is active. The tester wants to enumerate NTP peers, check synchronization status, offset, and stratum levels. Which command should the tester use?

Options:

A.  

ntpdc

B.  

ntpq

C.  

ntptrace

D.  

ntpdate

Discussion 0
Question # 47

A web server was compromised through DNS hijacking. What would most effectively prevent this in the future?

Options:

A.  

Changing IP addresses

B.  

Regular patching

C.  

Implementing DNSSEC

D.  

Using LAMP architecture

Discussion 0
Question # 48

A penetration tester is mapping a Windows-based internal network. The tester notices that TCP port 139 and UDP port 137 are open on multiple systems. File and printer sharing is enabled. To retrieve hostnames, user details, and domain roles without triggering alerts, which tool and method would be most effective?

Options:

A.  

Perform LDAP enumeration via anonymous bind

B.  

Use pspasswd to change remote passwords

C.  

Run nbtstat -A to query the NetBIOS name table

D.  

Use psloggedon to retrieve remote login sessions

Discussion 0
Question # 49

During a high-stakes engagement, a penetration tester abuses MS-EFSRPC to force a domain controller to authenticate to an attacker-controlled server. The tester captures the NTLM hash and relays it to AD CS to obtain a certificate granting domain admin privileges. Which network-level hijacking technique is illustrated?

Options:

A.  

Hijacking sessions using a PetitPotam relay attack

B.  

Exploiting vulnerabilities in TLS compression via a CRIME attack

C.  

Stealing session tokens using browser-based exploits

D.  

Employing a session donation method to transfer tokens

Discussion 0
Question # 50

During a red team simul-ation, an attacker crafts packets with malformed checksums so the IDS accepts them but the target silently discards them. Which evasion technique is being employed?

Options:

A.  

Insertion attack

B.  

Polymorphic shellcode

C.  

Session splicing

D.  

Fragmentation attack

Discussion 0
Question # 51

During a black-box penetration test, an attacker runs the following command:

nmap -p25 --script smtp-enum-users --script-args EXPN,RCPT < target IP >

The script successfully returns multiple valid usernames. Which server misconfiguration is being exploited?

Options:

A.  

The SMTP server allows authentication without credentials

B.  

The SMTP server has disabled STARTTLS, allowing plaintext enumeration

C.  

SMTP user verification commands are exposed without restrictions

D.  

DNS MX records point to an internal mail relay

Discussion 0
Question # 52

You are conducting a security audit at a government agency. During your walkthrough, you observe a temporary contractor sitting in the staff lounge using their smartphone to discretely record employees as they enter passwords into their systems. Upon further investigation, you find discarded documents in a nearby trash bin containing sensitive project information. What type of attack is most likely being performed?

Options:

A.  

Cisco-in attack

B.  

Insider attack

C.  

Distribution attack

D.  

Passive attack

Discussion 0
Question # 53

A penetration tester discovers that a system is infected with malware that encrypts all files and demands payment for decryption. What type of malware is this?

Options:

A.  

Worm

B.  

Spyware

C.  

Keylogger

D.  

Ransomware

Discussion 0
Question # 54

During a penetration test at Windy City Enterprises in Chicago, ethical hacker Mia Torres targets the company ' s public-facing site. By exploiting an unpatched vulnerability in the web server, she manages to alter visible content on the homepage, replacing it with unauthorized messages. Mia explains to the IT team that this kind of attack can damage the company ' s reputation and erode customer trust, even if sensitive data is not directly stolen.

Which type of web server attack is Mia most likely demonstrating?

Options:

A.  

DNS Hijacking

B.  

Frontjacking

C.  

File Upload Exploits

D.  

Website Defacement

Discussion 0
Question # 55

A penetration tester discovers that a system is infected with malware that encrypts all files and demands payment for decryption. What type of malware is this?

Options:

A.  

Worm

B.  

Spyware

C.  

Keylogger

D.  

Ransomware

Discussion 0
Question # 56

A penetration tester is mapping a Windows-based internal network. The tester notices that TCP port 139 and UDP port 137 are open on multiple systems. File and printer sharing is enabled. To retrieve hostnames, user details, and domain roles without triggering alerts, which tool and method would be most effective?

Options:

A.  

Perform LDAP enumeration via anonymous bind

B.  

Use pspasswd to change remote passwords

C.  

Run nbtstat -A to query the NetBIOS name table

D.  

Use psloggedon to retrieve remote login sessions

Discussion 0
Question # 57

A U.S.-based online securities trading firm in New York is reviewing its transaction authentication process. The security team confirms that each transaction is processed by first generating a hash of the transaction data. The hash value is then signed using the sender ' s private key. During verification, the recipient uses the corresponding public key to validate the signature before approving the transaction. The system documentation specifies that the same algorithm supports encryption, digital signatures, and key exchange mechanisms within the organization ' s secure communications infrastructure. Which encryption algorithm is being used in this implementation?

Options:

A.  

ElGamal

B.  

Diffie-Hellman

C.  

DSA

D.  

RSA

Discussion 0
Question # 58

Malware infecting multiple systems remains dormant until triggered and changes its code or encryption with each infection to evade detection. Which malware type best fits this description, and what is the most effective mitigation?

Options:

A.  

Rootkit – use anti-rootkit tools and patch systems

B.  

Adware – deploy anti-adware tools and train users

C.  

Worm – isolate infected systems and scan the network

D.  

Polymorphic malware – use behavior-based detection and ensure systems are patched

Discussion 0
Question # 59

A penetration tester evaluates a company ' s susceptibility to advanced social engineering attacks targeting its executive team. Using detailed knowledge of recent financial audits and ongoing projects, the tester crafts a highly credible pretext to deceive executives into revealing their network credentials. What is the most effective social engineering technique the tester should employ to obtain the necessary credentials without raising suspicion?

Options:

A.  

Send a mass phishing email with a link to a fake financial report

B.  

Create a convincing fake email from the CFO asking for immediate credential verification

C.  

Conduct a phone call posing as an external auditor requesting access to financial systems

D.  

Develop a spear-phishing email that references specific financial audit details and requests login confirmation

Discussion 0
Question # 60

A penetration tester is conducting an external assessment of a corporate web server. They start by accessing https://www.targetcorp.com/robots.txt and observe multiple Disallow entries that reference directories such as /admin-panel/, /backup/, and /confidentialdocs/. When the tester directly visits these paths via a browser, they find that access is not restricted by authentication and gain access to sensitive files, including server configuration and unprotected credentials. Which stage of the web server attack methodology is demonstrated in this scenario?

Options:

A.  

Injecting malicious SQL queries to access sensitive database records

B.  

Performing a cross-site request forgery (CSRF) attack to manipulate user actions

C.  

Gathering information through exposed indexing instructions

D.  

Leveraging the directory traversal flaw to access critical server files

Discussion 0
Get 312-50v13 dumps and pass your exam in 24 hours!

Free Exams Sample Questions