New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50v13 Certified Ethical Hacker Exam (CEHv13) is now Stable and With Pass Result | Test Your Knowledge for Free

312-50v13 Practice Questions

Certified Ethical Hacker Exam (CEHv13)

Last Update 3 days ago
Total Questions : 872

Dive into our fully updated and stable 312-50v13 practice test platform, featuring all the latest CEH v13 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our CEH v13 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50v13. Use this test to pinpoint which areas you need to focus your study on.

312-50v13 PDF

312-50v13 PDF (Printable)
$43.75
$124.99

312-50v13 Testing Engine

312-50v13 PDF (Printable)
$50.75
$144.99

312-50v13 PDF + Testing Engine

312-50v13 PDF (Printable)
$63.7
$181.99
Question # 1

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

Options:

A.  

113

B.  

69

C.  

123

D.  

161

Discussion 0
Question # 2

During a red team test, a web application dynamically builds SQL queries using a numeric URL parameter. The tester sends the following request:

http://vulnerableapp.local/view.php?id=1; DROP TABLE users;

The application throws errors and the users table is deleted. Which SQL injection technique was used?

Options:

A.  

UNION-based SQL injection

B.  

Stacked (Piggybacked) queries

C.  

Boolean-based SQL injection

D.  

Error-based SQL injection

Discussion 0
Question # 3

Which among the following is the best example of the hacking concept called "clearing tracks"?

Options:

A.  

After a system is breached, a hacker creates a backdoor to allow re-entry into a system.

B.  

During a cyberattack, a hacker injects a rootkit into a server.

C.  

An attacker gains access to a server through an exploitable vulnerability.

D.  

During a cyberattack, a hacker corrupts the event logs on all machines.

Discussion 0
Question # 4

Harry. a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What is the APT lifecycle phase that Harry is currently executing?

Options:

A.  

Preparation

B.  

Cleanup

C.  

Persistence

D.  

initial intrusion

Discussion 0
Question # 5

A multinational corporation recently survived a severe Distributed Denial-of-Service (DDoS) attack and has implemented enhanced security measures. During an audit, you discover that the organization uses both hardware- and cloud-based solutions to distribute incoming traffic in order to absorb and mitigate DDoS attacks while ensuring legitimate traffic remains available. What type of DDoS mitigation strategy is the company utilizing?

Options:

A.  

Black Hole Routing

B.  

Load Balancing

C.  

Rate Limiting

D.  

Sinkholing

Discussion 0
Question # 6

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?

Options:

A.  

Wireshark

B.  

Ettercap

C.  

Aircrack-ng

D.  

Tcpdump

Discussion 0
Question # 7

You discover an unpatched Android permission-handling vulnerability on a device with fully updated antivirus software. What is the most effective exploitation approach that avoids antivirus detection?

Options:

A.  

Develop a custom exploit using obfuscation techniques

B.  

Use Metasploit to deploy a known payload

C.  

Install a rootkit to manipulate the device

D.  

Use SMS phishing to trick the user

Discussion 0
Question # 8

A hacker is analyzing a system that uses two rounds of symmetric encryption with different keys. To speed up key recovery, the attacker encrypts the known plaintext with all possible values of the first key and stores the intermediate ciphertexts. Then, they decrypt the final ciphertext using all possible values of the second key and compare the results to the stored values. Which cryptanalytic method does this approach represent?

Options:

A.  

Flood memory with brute-forced credentials

B.  

Scrape electromagnetic leakage for bits

C.  

Use midpoint collision to identify key pair

D.  

Reverse permutations to bypass encryption

Discussion 0
Question # 9

A web application returns generic error messages. The analyst submits AND 1=1 and AND 1=2 and observes different responses. What type of injection is being tested?

Options:

A.  

UNION-based SQL injection

B.  

Error-based SQL injection

C.  

Boolean-based blind SQL injection

D.  

Time-based blind SQL injection

Discussion 0
Question # 10

During a targeted phishing campaign, a malicious HTML attachment reconstructs malware locally using obfuscated JavaScript without making external network calls, bypassing firewalls and IDS inspection. Which evasion technique is being employed?

Options:

A.  

HTML smuggling

B.  

Port forwarding

C.  

Cross-site scripting

D.  

HTTP header spoofing

Discussion 0
Question # 11

A penetration tester is performing the footprinting process and is reviewing publicly available information about an organization by using the Google search engine.

Which of the following advanced operators would allow the pen tester to restrict the search to the organization’s web domain?

Options:

A.  

[allinurl:]

B.  

[location:]

C.  

[site:]

D.  

[link:]

Discussion 0
Question # 12

A penetration tester evaluates a company's secure web application, which uses HTTPS, secure cookie flags, and strict session management to prevent session hijacking. To bypass these protections and hijack a legitimate user's session without detection, which advanced technique should the tester employ?

Options:

A.  

Utilize a session fixation attack by forcing a known session ID during login

B.  

Perform a Cross-Site Scripting (XSS) attack to steal the session token

C.  

Exploit a timing side-channel vulnerability to predict session tokens

D.  

Implement a Man-in-the-Middle (MitM) attack by compromising a trusted certificate authority

Discussion 0
Question # 13

A security analyst is investigating a potential network-level session hijacking incident. During the investigation, the analyst finds that the attacker has been using a technique in which they injected an authentic-looking reset packet using a spoofed source IP address and a guessed acknowledgment number. As a result, the victim's connection was reset. Which of the following hijacking techniques has the attacker most likely used?

Options:

A.  

TCP/IP hijacking

B.  

UDP hijacking

C.  

RST hijacking

D.  

Blind hijacking

Discussion 0
Question # 14

A red team operator wants to obtain credentials from a Windows machine without touching LSASS memory due to security controls and Credential Guard. They use SSPI to generate NetNTLM responses in the logged-in user context and collect those responses for offline cracking. Which attack technique is being used?

Options:

A.  

Internal Monologue attack technique executed through OS authentication protocol manipulations

B.  

Replay attack attempt by reusing captured authentication traffic sequences

C.  

Hash injection approach using credential hashes for authentication purposes

D.  

Pass-the-ticket attack method involving forged tickets for network access

Discussion 0
Question # 15

You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are starting an investigation to roughly analyze the severity of the situation. Which of the following is appropriate to analyze?

Options:

A.  

IDS log

B.  

Event logs on domain controller

C.  

Internet Firewall/Proxy log

D.  

Event logs on the PC

Discussion 0
Question # 16

in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values. What is this attack called?

Options:

A.  

Chop chop attack

B.  

KRACK

C.  

Evil twin

D.  

Wardriving

Discussion 0
Question # 17

Within the context of Computer Security, which of the following statements describes Social Engineering best?

Options:

A.  

Social Engineering is the act of publicly disclosing information

B.  

Social Engineering is the means put in place by human resource to perform time accounting

C.  

Social Engineering is the act of getting needed information from a person rather than breaking into a system

D.  

Social Engineering is a training program within sociology studies

Discussion 0
Question # 18

The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept.

What is the Wi-Fi encryption technology implemented by Debry Inc.?

Options:

A.  

WEP

B.  

WPA

C.  

WPA2

D.  

WPA3

Discussion 0
Question # 19

During a penetration test, you perform extensive DNS interrogation to gather intelligence about a target organization. Considering the inherent limitations of DNS-based reconnaissance, which of the following pieces of information cannot be directly obtained through DNS interrogation?

Options:

A.  

The specific usernames and passwords used by the organization’s employees.

B.  

The estimated geographical location of the organization’s servers derived from IP addresses.

C.  

The subdomains associated with the organization’s primary internet domain.

D.  

The IP addresses associated with the organization’s mail servers.

Discussion 0
Question # 20

A penetration tester is attempting to gain access to a wireless network that is secured with WPA2 encryption. The tester successfully captures the WPA2 handshake but now needs to crack the pre-shared key. What is the most effective method to proceed?

Options:

A.  

Perform a brute-force attack using common passwords against the captured handshake

B.  

Use a dictionary attack against the captured WPA2 handshake to crack the key

C.  

Execute a SQL injection attack on the router's login page

D.  

Conduct a de-authentication attack to disconnect all clients from the network

Discussion 0
Get 312-50v13 dumps and pass your exam in 24 hours!

Free Exams Sample Questions