๐ŸŽ„

CertoMetrics - 9% OFF Special Discount Offer - Ends In:

0d 00h 00m 00s
Coupon code: SALE2026

EC-Council Certified Ethical Hacker (CEH v13) (312-50v13)

Get full access to the updated question bank and pass on your first attempt.

Vendor

EC-Council

Certification

Ethical Hacking

Content

921 Qs

Status

Verified

Updated

6 days ago

Test the Practice Engine

Experience our real exam environment with free demo questions

Launch Free Demo
Best Value Bundle

Premium Bundle

Complete Success Suite

$108 $69

Save $39 Instantly

  • โœ“
    Full PDF + Interactive Engine Everything you need to pass
  • โœ“
    All Advanced Question Types Drag & Drop, Hotspots, Case Studies
  • โœ“
    Priority 24/7 Expert Support Direct line to certification leads
  • โœ“
    90 Days Free Priority Updates Stay current as exams change

Success Metric

98.4% Pass Rate

Verified by 15k+ Students
Secure Checkout
Popular

Standard Simulation

Practice Engine

$59

One-Time Payment

  • Web-Based (Zero Install)
  • Real Testing Environment Virtual & Practice Modes
  • Interactive Engine Drag & Drop, Hotspots
  • 60 Days Free Updates

Compatible with All Devices

Chrome
Verified Secure Checkout

Basic Tier

PDF Study Guide

$49

Digital Access

  • โœ“ Exam Questions (PDF)
  • โœ“ Mobile Friendly
  • โœ“ 60 Days Updates
Download Free Sample PDF

Verified 10-Question Preview

Secure Checkout

Verified Community

The CertoMetrics Standard.

Recommend the #1 platform for verified EC-Council certification resources.

Success Network

Help a Colleague Succeed.

Invite a peer to get their own updated 312-50v13 prep kit.

Exam Overview

The EC-Council Certified Ethical Hacker (CEH v13) certification is an industry benchmark, validating your expertise in offensive cybersecurity techniques. This credential signifies your ability to think like a malicious actor, master the tools and methodologies used in ethical hacking, and proactively identify vulnerabilities before they can be exploited. Earning your CEH v13 dramatically enhances your professional value, demonstrating a deep understanding of penetration testing, attack vectors, and defensive strategies. It's crucial for cybersecurity professionals aiming to fortify organizational defenses, advance their careers, and gain recognition as a highly skilled practitioner capable of safeguarding critical assets in an ever-evolving digital threat landscape.

Questions

125

Passing Score

70% (700/1000)

Duration

240 Minutes

Difficulty

Intermediate

Level

Professional

Skills Measured

Information Security Fundamentals, Threat Landscape & Attack Vectors
Reconnaissance, Footprinting, Scanning Networks & Vulnerability Analysis
System Hacking, Malware Threats, Social Engineering & Evading Defenses
Web Application Hacking, Mobile Platform Hacking, IoT/OT Hacking & Cloud Computing Security
Wireless Networks Hacking, Cryptography & Practical Penetration Testing Phases

Career Path

Target Roles

Ethical Hacker Penetration Tester Cybersecurity Analyst

Common Questions

Is the material up to date?

Yes. We update our question bank weekly to match the latest EC-Council standards. You get free updates for 90 days.

What format do I get?

You get instant access to both the **PDF** (for reading) and our **Premium Test Engine** (for exam simulation).

Is there a guarantee?

Absolutely. If you fail the 312-50v13 exam using our materials, we offer a full money-back guarantee.

When do I get the download?

Instantly. The download link is available in your dashboard immediately after payment is confirmed.

Free Study Guide Samples

Previewing updated 312-50v13 bank (100 Questions).

QUESTION 1

Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She discovered a malicious program spread through the instant messenger application used by her team. The attacker had obtained access to one of her teammate's messenger accounts and started sending files across the contact list. Which best describes the attack scenario and what measure could have prevented it?

A
Insecure Patch Management; updating application software regularly
B
Instant Messenger Applications; verifying the sender's identity before opening any files
C
Rogue/Decoy Applications; ensuring software is labeled as TRUSTED
D
Portable Hardware Media/Removable Devices; disabling Autorun functionality

Correct Option: B

โœ… Instant Messenger Applications; verifying the sender's identity before opening any files
Description: Instant Messenger (IM) applications, while essential for rapid communication, pose significant security risks. They are frequently exploited by attackers as vectors for social engineering, phishing, and malware distribution. Attackers may compromise accounts, spoof identities, or craft convincing messages to trick users into opening malicious files or clicking on dangerous links, often under the guise of a trusted contact. Why this fits: The pairing highlights a critical threat (IM applications as an attack vector) and a fundamental user-centric mitigation. Verifying the sender's identity through an out-of-band channel or other trusted means before interacting with any attachments or links received via IM is a proactive defense against various attacks, including malware infection and data breaches. This practice directly counters social engineering tactics and enhances the security posture by promoting user vigilance, a core principle in cybersecurity and ethical hacking.

QUESTION 2

An ethical hacker needs to enumerate user accounts and shared resources within a company's internal network without raising any security alerts. The network consists of Windows servers running default configurations. Which method should the hacker use to gather this information covertly?

A
Exploit null sessions to connect anonymously to the IPC$ share
B
Deploy a packet sniffer to capture and analyze network traffic
C
Utilize SNMP queries to extract user information from network devices
D
Perform a DNS zone transfer to obtain internal domain details

Correct Option: A

โœ… Choice A: Exploit null sessions to connect anonymously to the IPC$ share
Description: A null session refers to an unauthenticated connection established to a Windows server using a blank username and password. The IPC$ (Inter-Process Communication) share is a hidden, default share on Windows systems used for communication between processes, particularly for named pipes and RPC. By exploiting null sessions to connect to IPC$, an attacker could historically enumerate significant amounts of information about a target system, such as user accounts, group names, share names, services, and even lists of machines and domain controllers, without requiring any credentials. Why this fits: This technique is a classic and fundamental reconnaissance and enumeration method taught in ethical hacking courses like CEH. It allows an attacker to gather critical intelligence about a target Windows environment (user names, group names, shares, etc.) anonymously, which is invaluable for planning subsequent attacks like password guessing, social engineering, or privilege escalation. It directly addresses the goal of obtaining information without authentication, making it a powerful initial step in a penetration test against vulnerable Windows systems.

QUESTION 3

penetration tester suspects that a web applicationโ€™s user profiplaege is vulnteo SrQL ainjebctilon,e as it

uses the useriD parameter in SQL queries without proper sanitization. Which technique should the tester use to confirm the vulnerability?

A
Attempt a directory traversal attack using the userlD parameter
B
Inject HTML code into the userID parameter to test for Cross-Site Scripting (XSS)
C
Modify the useriD parameter in the URL to ' OR 1'="1 and check if it returns multiple profiles
D
Use the userlD parameter to perform a brute-force attack on the admin login page

Correct Option: C

โœ… Modify the useriD parameter in the URL to ' OR 1'="1 and check if it returns multiple profiles
Description: This action attempts to exploit a SQL Injection vulnerability. SQL Injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g., to dump the database contents to the attacker). The payload ' OR 1'="1 is a classic SQL Injection technique known as a "boolean-based blind SQL injection" or "always true" condition. Why this fits: If the userID parameter is directly incorporated into a SQL query without proper sanitization (e.g., SELECT * FROM users WHERE userID = 'entered_userID'), inserting ' OR 1'="1 would transform the query into something like SELECT * FROM users WHERE userID = '' OR 1='1'. Since 1='1' is always true, the OR condition would cause the database to return all rows (or multiple profiles) from the users table, effectively bypassing the intended single user lookup and revealing the vulnerability. This is a common and effective initial test for SQL injection.

QUESTION 4

A multinational corporation's computer system was infiltrated by an advanced persistent threat (APT). During forensic analysis, it was discovered that the malware was utilizing a blend of two highly sophisticated techniques to stay undetected and continue its operations.

Firstly, the malware was embedding its harmful code into the actual binary or executable part of genuine system files rather than appending or prepending itself to the files. This made it exceptionally difficult to detect and eradicate, as doing so risked damaging the system files themselves.

Secondly, the malware exhibited characteristics of a type of malware that changes its code as it propagates, making signature-based detection approaches nearly impossible.

On top of these, the malware maintained a persistent presence by installing itself in the registry, making it able to survive system reboots.

Given these distinctive characteristics, which two types of malware techniques does this malware most closely embody?

A
Polymorphic and Metamorphic malware
B
Polymorphic and Macro malware
C
Macro and Rootkit malware
D
Metamorphic and Rootkit malware

Correct Option: D

โœ… Metamorphic malware
Description: Metamorphic malware is a highly advanced type of malware that changes its internal structure and code with each infection, essentially rewriting itself to create a new, distinct variant every time it propagates. Unlike polymorphic malware, which only changes its encryption and decryption routine, metamorphic malware alters its entire instruction set, instruction order, and even programming language. Why this fits: This capability makes metamorphic malware extremely difficult to detect using traditional signature-based antivirus systems, as there is no consistent signature pattern to identify. It represents one of the most sophisticated forms of malware evasion due to its ability to completely transform its appearance.



โœ… Rootkit malware
Description: A rootkit is a collection of malicious software tools designed to obtain and maintain unauthorized access to a computer system while actively hiding its presence and malicious activities from the user and security software. Rootkits often achieve this by modifying core operating system components, kernel modules, or system utilities to conceal files, processes, network connections, and registry entries associated with the malware. Why this fits: Rootkits are a significant threat due to their stealth capabilities and persistence. Their primary purpose is to remain undetected, providing hidden, sustained access to a compromised system, making them incredibly challenging to detect and remove, and a key concern for advanced threat detection and incident response.

QUESTION 5

A penetration tester is evaluating the security of a mobile application and discovers that it lacks proper input validation. The tester suspects that the application is vulnerable to a malicious code injection attack. What is the most effective way to confirm and exploit this vulnerability?

A
Use directory traversal to access sensitive files stored in the application's internal storage
B
Execute a dictionary attack on the mobile app's encryption algorithm
C
Perform a brute-force attack on the application's login page to guess weak credentials
D
Inject a malicious JavaScript code into the input fields and observe the application's behavior

Correct Option: A

โœ… Use directory traversal to access sensitive files stored in the application's internal storage
Description: Directory traversal, also known as path traversal, is a web security vulnerability that allows an attacker to read arbitrary files on the server running an application, and in some cases, write files to the server. It exploits insufficient security validation/sanitization of user-supplied input filepaths, allowing an attacker to manipulate variables that reference files with "dot-dot-slash (../)" sequences, or similar constructs, to move up the directory hierarchy and access files or directories outside of the intended root directory. Why this fits: The objective is to "access sensitive files stored in the application's internal storage." Directory traversal directly targets this by manipulating file paths to access unauthorized directories and files on the system where the application resides. It's a common method for attackers to gain access to configuration files, source code, or other sensitive data stored outside the web root. The other options describe different types of attacks (cryptographic attacks, authentication attacks, client-side injection) that do not directly correspond to accessing arbitrary files within the application's internal storage via path manipulation.

QUESTION 6

During an internal penetration test, a security analyst assesses a web application that interfaces with a

backend Oracle database. Initial atternpts using standard SQL injection payloads such as โ€˜ OR '1'="1 and UNION SELECT return no useful output and do not affect application behavior. Suspecting input sanitization and error suppression, the analyst crafts a new payload:

1AND 1< (SELECT COUNT(*) FROM all_users A, all_users B, all_users

C
Heavy query-based SQL injection
A
Out-of-band SQL injection
B
Union-based SQL injection
D
Time-based SQL injection using WAITFOR DELAY

Correct Option: C

โœ… Choice C: Heavy query-based SQL injection
Description: Heavy query-based SQL injection is a sophisticated technique, primarily utilized in blind SQL injection scenarios, where an attacker crafts computationally expensive or resource-intensive SQL queries. These queries are designed to consume significant database server resources (e.g., CPU cycles, memory, I/O operations) or perform extensive data processing. The attacker then infers sensitive information by observing the database server's response time, resource utilization patterns, or other observable side effects caused by the execution of these "heavy" queries. Unlike explicit time-based blind SQL injection which uses commands like WAITFOR DELAY to introduce a fixed delay, this method relies on the inherent computational cost or processing burden of the injected query to create measurable differences in response time or behavior, based on true/false conditions for data exfiltration. This can involve complex mathematical operations, large joins, recursive queries, or operations on large datasets. Why this fits: Without the specific question context, we infer that "Heavy query-based SQL injection" is the correct answer because it describes a technique used to extract data blindly by leveraging the resource consumption of crafted queries to infer information. This method is distinct from:

  • Out-of-band SQL injection (Choice A), which relies on the database making an external connection to an attacker-controlled server.
  • Union-based SQL injection (Choice B), which involves directly retrieving data using the UNION SELECT statement and seeing it in the HTTP response.
  • Time-based SQL injection using WAITFOR DELAY (Choice D), which specifically uses explicit delay commands to infer data.

Therefore, "Heavy query-based SQL injection" fits a scenario where an attacker observes the performance or resource impact of their complex, injected queries to deduce information in a blind context, but not through direct output, external connections, or explicit WAITFOR DELAY commands.

QUESTION 7

Recently, the employees of a company have been receiving emails that seem to be from their colleagues, but with suspicious attachments. When opened, these attachments appear to install malware on their systems. The IT department suspects that this is a targeted malware attack. Which of the following measures would be the most effective in preventing such attacks?

A
Disabling Autorun functionality on all drives
B
Avoiding the use of outdated web browsers and email software
C
Regularly scan systems for any new files and examine them
D
Applying the latest patches and updating software programs

Correct Option: D

โœ… Applying the latest patches and updating software programs
Description: Patching refers to the process of applying updates, fixes, or enhancements to software programs or operating systems. These patches are typically released by software vendors to address bugs, improve performance, add new features, and, critically, fix security vulnerabilities. Updating software programs involves replacing an older version of software with a newer, often more secure, version. Why this fits: In the context of cybersecurity and ethical hacking, a vast number of successful attacks exploit known vulnerabilities in outdated or unpatched software. Attackers often scan for systems running older software versions that have publicly known exploits. By consistently applying the latest patches and keeping all software (operating systems, applications, browsers, etc.) up-to-date, organizations significantly reduce their attack surface and mitigate the risk of exploitation. This proactive measure is a cornerstone of effective vulnerability management and is a fundamental defense against a wide array of cyber threats, directly preventing attackers from leveraging known weaknesses. While other choices represent good security practices, applying patches and updates is arguably the single most critical and comprehensive action to prevent exploitation of common vulnerabilities.

QUESTION 8

During a security evaluation of a smart agriculture setup, an analyst investigates a cloud-managed irrigation controller. The device is found to transmit operational commands and receive firmware updates over unencrypted HTTP. Additionally, it lacks mechanisms to verify the integrity or authenticity of those updates. This vulnerability could allow an adversary to intercept communications or inject malicious firmware, leading to unauthorized control over the device's behavior or denial of essential functionality. Which IoT threat category does this situation best illustrate?

A
Insecure default settings
B
Insecure ecosystem interfaces
C
Insufficient privacy protection
D
Insecure network services

Correct Option: D

โœ… Insecure network services
Description: Insecure network services refer to vulnerabilities found in services running on network devices (e.g., web servers, FTP servers, SSH, DNS, SMB) or operating systems, which can be exploited by attackers. These vulnerabilities often stem from misconfigurations, unpatched software, weak encryption, default or weak credentials, or design flaws that allow unauthorized access, denial-of-service, or remote code execution. Why this fits: The Certified Ethical Hacker (CEH) certification heavily emphasizes identifying and exploiting vulnerabilities in network services. Many common attack vectors, such as port scanning, banner grabbing, service enumeration, buffer overflows, and exploitation of known CVEs, directly target insecure network services. For example, an outdated FTP server, a web server with default credentials, or an unpatched SSH daemon all represent insecure network services that ethical hackers would aim to identify and exploit during a penetration test. This category encompasses a broad range of critical vulnerabilities that are foundational to network security and ethical hacking practices.

QUESTION 9

As a cybersecurity consultant, you have been hired by a multinational corporation to identify potential

security risks in their network. During the enumeration phase, you utilize LDAP to gather information about the network infrastructure. However, you observe that some critical information isn't retrievable. What could be the primary reason for this?

A
The company network is currently experiencing heavy traffic, leading to dropped requests.
B
Orre LDAP directory data is protected by Access Control Lists (ACLs).
C
The hosts are located in a different subnet.
D
The LDAP service is running on a non-standard port.

Correct Option: B

โœ… Choice B: Our LDAP directory data is protected by Access Control Lists (ACLs).
Description: Access Control Lists (ACLs) are fundamental security mechanisms used to define and enforce permissions for users and processes accessing specific resources. In the context of an LDAP (Lightweight Directory Access Protocol) directory, ACLs specify which users or groups have rights to read, write, modify, delete, or search particular entries, attributes, or subtrees within the directory. Why this fits: LDAP directories store critical information, and protecting this data from unauthorized access or modification is paramount. When a client attempts to interact with the LDAP directory (e.g., query for user details, modify a password entry, or add new data), the LDAP server evaluates the request against its configured ACLs. If the requesting entity (user or application) does not possess the required permissions as defined by the ACLs for the specific data or operation, the request will be denied. This mechanism directly protects the LDAP directory data by restricting access based on granular permissions, making it a robust form of data protection. The other options are either general network issues (A), network reachability issues (C), or security-through-obscurity (D), none of which provide direct, explicit data protection within the LDAP service itself like ACLs do.

QUESTION 10

Which among the following is the best example of the third step (delivery) in the cyber kill chain?

A
An intruder creates malware to be used as a malicious attachment to an email.
B
An intruder's malware is triggered when a target opens a malicious email attachment.
C
An intruder's malware is installed on a targets machine.
D
An intruder sends a malicious attachment via email to a target.

Correct Option: D

โœ… An intruder sends a malicious attachment via email to a target.
Description: This action describes the "delivery" phase of a cyberattack, specifically when an attacker transmits a weaponized payload (malware) to a target using email as the vector. This often involves social engineering to entice the target to interact with the malicious attachment. Why this fits: In the common cyberattack frameworks, such as the Cyber Kill Chain, "delivery" is the stage where the attacker transmits the weaponized payload to the victim. Sending a malicious email attachment directly aligns with this phase.

  • Choice A (creating malware) is part of the weaponization phase.
  • Choice B (malware triggered when opened) is part of the exploitation phase.
  • Choice C (malware installed) is part of the installation phase. Only Choice D describes the actual transmission of the malicious component to the target, which is the definition of delivery in this context.
QUESTION 11

A penetration tester is evaluating a secure web application that uses HTTPS, secure cookie flags, and regenerates session IDs only during specific user actions. To hijack a legitimate user's session without triggering security alerts, which advanced session hijacking technique should the tester employ?

A
Conduct a session token prediction attack by analyzing session ID patterns.
B
Perform a man-in-the-middle attack by exploiting certificate vulnerabilities.
C
Use a session fixation attack by setting a known session ID before the user logs in.
D
Implement a Cross-Site Scripting (XSS) attack to steal session tokens.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 12

During a routine security audit, administrators found that cloud storage backups were illegally accessed and modified. What countermeasure would most directly mitigate such incidents in the future?

A
Implementing resource auto-scaling.
B
Deploying biometric entry systems.
C
Adopting the 3-2-1 backup model.
D
Regularly conducting SQL injection testing.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 13

A security analyst is preparing to analyze a potentially malicious program believed to have infiltrated an organization's network. To ensure the safety and integrity of the production environment, the analyst decided to use a sheep dip computer for the analysis. Before initiating the analysis, what key step should the analyst take?

A
Install the potentially malicious program on the sheep dip computer.
B
Store the potentially malicious program on an external medium, such as a CD-ROM.
C
Run the potentially malicious program on the sheep dip computer to determine its behavior.
D
Connect the sheep dip computer to the organization's internal network.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 14

A penetration tester suspects that the web application's "Order History" page is vulnerable to SQL Injection because it displays user orders based on an unprotected user ID parameter in the URL. What is the most appropriate approach to test this?

A
Perform a directory traversal attack to access sensitive system files
B
Use a brute-force attack on the login form to identify valid user credentials
C
Inject JavaScript into the URL parameter to test for Cross-Site Scripting (XSS)
D
Modify the URL parameter to user ID=1 OR 1=1 and observe if all orders are displayed

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 15

As a security expert for a prominent tech company, you've noticed an increasing number of attacks on your

web services. You've concluded that the best course of action is to enhance your patch management strategies. Considering the information presented, which of the following strategies would be most effective in ensuring the secure and efficient management of patches and hotfixes?

A
Manual installation of patches and hotfixes on the live server directly from the vendorsโ€™ websites.
B
Only applying patches and hotfixes that are distributed outside the customer organization to avoidvendor-specific vulnerabilities.
C
Downloading and applying all patches and hotfixes, regardless of the source, to cover all possiblevulnerabilities.
D
Implementing an automatic patch management process and using a patch management too! tomonitor the patched systems.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 16

Martin, a Certified Ethical Hacker (CEH), is conducting a penetration test on a large enterprise network. He suspects that sensitive information might be leaking out of the network. Martin decides to use network sniffing as part of his testing methodology. Which of the following sniffing techniques should Martin employ to get a comprehensive understanding of the data flowing across the network?

A
Raw Sniffing
B
MAC Flooding
C
ARP Poisoning
D
DNS Poisoning

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 17

An attacker places a malicious VM on the same physical server as a target VM in a multi-tenant cloud environment. The attacker then extracts cryptographic keys using CPU timing analysis. What type of attack was conducted?

A
Cache poisoned denial of service (CPDoS)
B
Side-channel attack
C
Cloud cryptojacking
D
Metadata spoofing

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 18

Emily, a security engineer at a Chicago-based healthcare provider, is auditing the organization's new cloud environment after a breach where sensitive patient records were exposed. Her investigation reveals that the root cause was the lack of encryption during data transmission between end-user devices and cloud storage. To mitigate this issue and align with HIPAA compliance requirements, Emily must prioritize addressing the correct cloud computing security risk

Which cloud computing threat should Emily address to mitigate the risk of sen tive data being exposed during transmission?

A
Multi-Tenancy and Physical Security
B
Service and Data Integration
C
Infrastructure Security
D
Incidence Analysis and Forensic Support

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 19

You are a security analyst of a large IT company and are responsible for maintaining the organizationโ€™s security posture. You are evaluating multiple vulnerability assessment tools for your network. Given that your network has a hybrid IT environment with on-premise and cloud assets, which tool would be most appropriate considering its comprehensive coverage and visibility, continuous scanning, and ability to monitor unexpected changes before they turn into breaches?

A
GFI LanCuard
B
Qualys Vulnerability Management
C
Open VAS
D
Nessus Professional

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 20

A penetration tester is conducting a security assessment for a client and needs to capture sensitive information transmitted across multiple VLANs without being detected by the organization's security monitoring systems. The network employs strict VLAN segmentation and port security measures to restrict unauthorized access. Which advanced sniffing technique should the tester use to discreetly intercept and analyze traffic across all VLANs?

A
Implement switch port mirroring on all VLANs
B
Exploit a VLAN hopping vulnerability to access multiple VLANs
C
Use ARP poisoning to perform a man-in-the-middle attack
D
Deploy a rogue DHCP server to redirect network traffic

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 21

On July 2S, 2025, during a penetration test at Horizon Financial Services in Chicago, Illinois, cybersecurity specialist Laura Bennett is analyzing an attack simulation targeting the company's online banking portal. The system logs reveal a coordinated barrage of traffic from multiple compromised systems. orchestrated through a central command-and-control server. flooding the portal and rendering it unavailable to legitimate users. The attack leverages a network of infected devices, likely recruited via malicious links on social media.

What is the structure or concept most likely used to launch this coordinated attack?

A
Central Source Propagation
B
Smurf Attack
C
Distributed Rcflection Chnial-of-Scrvicc (DQDoS)
D
Botnet

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 22

Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using different utilities to identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one special command-line utility.

Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?

A
wash
B
net view
C
macof
D
ntptrace

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 23

During a black-box internal penetration test, a security analyst is tasked with identifying potentially exploitable services running on an SNMP-enabled Linux server. The target organization uses SNMPv2, and the default community string "public" has not been changed. The analyst confirms that UDP port 161 is open and accessible. To gather service-related intelligence for privilege escalation or lateral movement, the analyst decides to enumerate all running processes on the host. Which Nmap command would most effectively retrieve the required information?

A
nmap -sU -p 161 --script snmp-sysdescr
B
nmap -sU -p 161 --script snmp-win32-services
C
nmap -sU -p 161 --script snmp-processes
D
nmap -sU -p 161 --script snmp-interfaces

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 24

You've recently Joined an international software firm as part of the cybersecurity governance team. While

preparing for an internal compliance review, your supervisor asks you to identify the ISO/IEC standard that

serves as a comprehensive framework for managing an organization's information security. You examine

several standards. including those focusing on risk management. cybersecurity. and control implementation. However, you need to select the one that defines the overarching structure for managing information security programs across the organization.

Which of the following standards should you choose?

A
ISO/IEC 270092022
B
ISO/IEC 7001:2022
C
ISO/IEC 770022022
D
ISO/IEC 277012019

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 25

Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device. In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip.

Which of the following types of fault injection attack is performed by Robert in the above scenario?

A
Frequency/voltage tampering
B
Optical, electromagnetic fault injection (EMFI)
C
Temperature attack
D
Power/clock/reset glitching

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 26

During an internal red team engagement, an operator discovers that TCP port 389 is open on a target system identified as a domain controller. To assess the extent of LDAP exposure, the operator runs the command lapser -h <Target IP> -x -s base naming Contexts and receives a response revealing the base distinguished name (DN): DC=internal DC=corp. This naming context indicates the root of the LDAP directory structure used by the organization's Active Directory. With this discovery, the operator plans the next step to continue LDAP enumeration and expand visibility into users and objects in the domain. What is the most logical next action?

A
Launch a brute-force attack against user passwords via SMB
B
Use the base DN in a filter to enumerate directory objects
C
Attempt an RDP login to the domain controller
D
Conduct an ARP scan on the local subnet

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 27

Emma, an ethical hacker at a Chicago-based healthcare provider, is performing a penetration test on the

organization's patient record system following a recent data breach. During her investigation. she discovers

that attackers gained access to a large volume of encrypted patient records but had no knowledge of the

original data or encryption keys. Emma observes that the system uses a block cipher and suspects the

attackers may have applied a cryptanalytic method that examines encrypted outputs in bulk to detect

structural or statistical patterns in the encrypted data.

Which cryptanalysis technique should Emma investigate to assess the system's vuln ility in this scenario?

A
Known.plaintext attack
B
Ciphertext-on by attack
C
Chosen-plaintext attack
D
Chosen-ciphertext attack

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 28

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks.

What is the technique employed by Kevin to improve the security of encryption keys?

A
Key stretching
B
Public key infrastructure
C
Key derivation function
D
Key reinstallation

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 29

A penetration tester is tasked with compromising a company's wireless network, which uses WPA2-PSK encryption. The tester wants to capture the WPA2 handshake and crack the pre-shared key. What is the most appropriate approach to achieve this?

A
Execute a Cross-Site Scripting (XSS) attack on the router's admin panel
B
Perform a brute-force attack directly on the WPA2 encryption
C
Use a de-authentication attack to force a client to reconnect, capturing the WPA2 handshake
D
Conduct a Man-in-the-Middle attack by spoofing the router's MAC address

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 30

While conducting a security review for a public healthcare data center, Jason, a senior penetration tester, is asked to gather system descriptions, contact details, and interface metrics from a set of legacy network

devices running SNMPv2. These devices respond on UDP port 161 and use default community strings. Jason must retrieve this structured SNMP data in a format that can be fed into a reporting script without requiring GUI based tools or raw packet captures.

Which of the following methods should Jason use?

A
Use Soft Perfect Network Scanner to scan for SNMP enabled systems
B
Use Nmap to identify SNMP ports and collect basic SNMP service banners
C
Use Wireshark to inspect SNMP packets on the wire for useful fields
D
Use Snmp WaEk to query and retrieve structured SNMP data from the devices

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 31

In an attempt to damage the reputation of a competitor organization, Hailey, a professional hacker, gathers a list of employee and client email addresses and other related information by using various search engines, social networking sites, and web spidering tools. In this process, she also uses an automated tool to gather a list of words from the target website to further perform a brute-force attack on the previously gathered email addresses.

What is the tool used by Hailey for gathering a list of words from the target website?

A
CeWL
B
Orbot
C
Shadowsocks
D
Psiphon

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 32

A penetration tester runs a vulnerability scan and identifies an outdated version of a web application running on the company's server. The scan flags this as a medium-risk vulnerability. What is the best next step for the tester?

A
Brute-force the admin login page to gain unauthorized access
B
Ignore the vulnerability since it is only flagged as medium-risk
C
Perform a denial-of-service (DoS) attack to crash the web application
D
Research the vulnerability to check for any available patches or known exploits

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 33

During a security penetration test at ABC Financial Services in Miami, Florida, on July 9, 2025, ethical hacker Javier Morales targets the company's online banking portal to assess its resilience. Over several hours. The portal's web server begins to fatter, with legitimate users reporting inability to log in or complete transactions.

The IT team notices the server is struggling to accept new connections, as its maximum connection limit is

nearly reached. despite no significant spike in overall network traffic. Javier's controlled test, run from a secure system, logs interactions to simulate a real attack, aiming to evaluate the IT team's a

to identify the threat.

What DoS/DDoS attack technique is Javier's exercise primarily simulating?

A
Peer-to-Pccr Attack
B
Slowdoris Attack
C
SYN Attack
D
UDP Flood Attack

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 34

Calvin, a software developer, uses a feature that helps him auto-generate the content of a web page without manual involvement and is integrated with SSI directives. This leads to a vulnerability in the developed web application as this feature accepts remote user inputs and uses them on the page. Hackers can exploit this feature and pass malicious SSI directives as input values to perform malicious activities such as modifying and erasing server files.

What is the type of injection attack Calvin's web application is susceptible to?

A
CRLF injection
B
Server-side template injection
C
Server-side JS injection
D
Server-side includes injection

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 35

A penetration tester targets a company's executive assistants by referencing upcoming board meetings in an email requesting access to confidential agendas. What is the most effective social engineering technique to obtain the necessary credentials without raising suspicion?

A
Call posing as a trusted IT support to verify credentials
B
Create a personalized email referencing specific meetings and request access
C
Send a mass phishing email with a fake meeting link
D
Develop a fake LinkedIn profile to connect and request information

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 36

During a security assessment in San Francisco, an ethical hacker is tasked with evaluating a network's

resilience against stealthy reconnaissance attempts. The hacker needs to employ a scanning technique that leverages TCP nags to evade detection by intrusion detection systems. relying on the targetts response

behavior to infer port states without completing a full connection. Which approach best aligns with this

strategy. ensuring minimal visibility during the assessment?

A
TCP Connect Scan
B
Network Scanning
C
FIN Scan
D
NULL scan

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 37

Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size and obtained the following results:

TTL: 64 -

Window Size: 5840 -

What the OS running on the target machine?

A
Windows OS
B
Mac OS
C
Linux OS
D
Solaris OS

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 38

During an internal assessment, a penetration tester gains access to a hash dump containing NTLM password hashes from a compromised Windows system. To crack the passwords efficiently, the tester uses a high-performance GPU setup with the hash cat tool, configuring it to attempt millions of password combinations per second using a known hash algorithm. This setup drastically reduces the time required for password recovery compared to CPU-based cracking methods. Which technique is being optimized in this scenario?

A
Exploit dictionary rules with appended symbols
B
Leverage hardware acceleration for cracking speed
C
Spoof NetBIOS to impersonate a file server
D
Dump SAM contents for offline password retrieval

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 39

In the heart of Silicon Valley, ethical hacker Sophia Nguyen is hired by InnoVate Solutions, a San Francisco- based startup, to secure their cloud-based task management platform. On March IS, 2025, Sophia begins testing a feature that allows users to upload custom workflow templates to streamline project assignments. By carefully crafting a template file, she manipulates the platform's data processing, triggering unexpected behavior that grants her administrative access to restricted project dashboards. The issue arises from the platform's handling of user-supplied data during object reconstruction, not from dat

se queries, client-side code execution, or session manipulation. Sophia documents her findings to help Innovate's developers strengthen their application.

Which web application vulnerability is Sophia most likely exploiting in Innovate Solutions' task management

platform?

A
Insecure Deserialization
B
Verbose Error Messages
C
Session Hijacking
D
Local File Inclusion

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 40

What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?

A
Performing content enumeration on the web server to discover hidden folders
B
Using wget to perform banner grabbing on the webserver
C
Flooding the web server with requests to perform a DoS attack
D
Downloading all the contents of the web page locally for further examination

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 41

A penetration tester finds malware that spreads across a network without user interaction, replicating itself from one machine to another. What type of malware is this?

A
Worm (Checked/Selected)
B
Virus
C
Ransomware
D
Keylogger

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 42

In a high-stakes cybersecurity exercise in Boston, Emily, an ethical hacker, is tasked with tracing a mock

phishing email sent to a healthcare provider's staff. using the email header. she identifies a series of IP

addresses and server details, including multiple timestamps and server names. Her objective is to pinpoint the exact moment the email was processed by the sender's system. As part of her reconnaissance. what specific detail from the email header should Emily examine to determine this information?

A
Authentication system used by sender's mail server
B
Date and time of message sent
C
Date and time received by the originator's email servers
D
Sender's mail server

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 43

James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an open-source framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources.

What is the framework used by James to conduct footprinting and reconnaissance activities?

A
OSINT framework
B
WebSploit Framework
C
Browser Exploitation Framework
D
SpeedPhish Framework

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 44

system within a corporate network protected by advanced firewalls, IDS, and email security gateways. To maintain persistence and evade content inspection, the attacker crafts a malicious HTML email attachment containing obfuscated JavaScript code. When the user opens the attachment in a browser, a hidden JavaScript blob dynamically reconstructs a malware payload and triggers an automatic file download on the client side. No external connections are initiated during this process, making it difficult for network security tools to detect or block the attack. Which evasion technique is being employed to bypass the firewall and IDS protections?

A
Port forwarding
B
HTML smuggling
C
HTTP header spoofing
D
Cross-site scripting

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 45

In the heart of Silicon Valley, California, network administrator Jake Henderson oversees the web

infrastructure for Tech Trend innovations, a startup specializing in cloud solutions. During a routine architecture review. Jake evaluates the setup of their web server. which handles high-traffic API requests. He notes that the server's primary module processes incoming requests and works with additional modules to manage encryption, URL rewriting, and authentication. Curious about the server's design. Jake consults the documentation to ensure optimal performance and security.

Which web server component is Jake analyzing as part of Tech Trend Innovations' architecture?

A
Virtual Document Tree
B
Application Server
C
Document Root
D
HTTP Server (Core)

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 46

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages.

What is the attack performed in the above scenario?

A
Cache-based attack
B
Timing-based attack
C
Downgrade security attack
D
Side-channel attack

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 47

A penetration tester suspects that a web application's user profile page is vulnerable to SQL Injection, as it uses the userID parameter in SQL queries without proper sanitization. Which technique should the tester use to confirm the vulnerability?

A
Inject HTML code into the userID parameter to test for Cross-Site Scripting (XSS)
B
Use the userID parameter to perform a brute-force attack on the admin login page
C
Modify the userID parameter in the URL to ' OR '1'='1 and check if it returns multiple profiles
D
Attempt a directory traversal attack using the userID parameter

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 48

During a post-exploitation phase in a network compromise simulation, ethical hacker Devon Hughes gains a Meterpreter session on a managers Windows 10 workstation. To maintain stealth, he avoids actions that generate obvious signs of tampering such as privilege escalation or file system changes. Instead. he wants to monitor the user's live activity over time without their knowledge. focusing specifically on input patterns and active sessions.

Which Meterpreter command should he use to achieve this objective with minimal v

A
gctsystcm
B
hashdump
C
persistence
D
Keyscan-start

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 49

When considering how an attacker may exploit a web server, what is web server footprinting?

A
When an attacker creates a complete profile of the site's external links and file structures
B
When an attacker uses a brute-force attack to crack a web-server password
C
When an attacker implements a vulnerability scanner to identity weaknesses
D
When an attacker gathers system-level data, including account details and server names

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 50

A penetration tester is running a vulnerability scan on a company's network. The scan identifies an open port with a high-severity vulnerability linked to outdated software. What is the most appropriate next step for the tester?

A
Ignore the vulnerability and focus on finding more vulnerabilities
B
Research the vulnerability and determine if it has a publicly available exploit
C
Execute a denial-of-service (DoS) attack on the open port
D
Perform a brute-force attack on the service running on the open port

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 51

You are Ava Mitchell, an ethical hacker at Sentinel Cyberwars, hired to test the wireless defenses of

Horizon Financial. a bank in Boston, Massachusetts. During a covert nighttime assessment, your objective is to simulate an attacker attempting to breach the bank's WPA-protected Wi-Fi network. You deploy a tool that allows you to capture wireless packets, send de-authentication packets to force client reconnections. And attempt to recover the encryption key, all within a single graphical interface. Based on the described

functionality, which Wi-Fi security auditing tool are you using?

A
RF protect
B
WatchGuard Wi-Fi Cloud WIPS
C
Fern WiFi Cracker
D
Cisco Adaptive Wireless IPS

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 52

Which of the following types of SQL injection attacks extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?

A
Union SQL injection
B
Error-based injection
C
Blind SQL injection
D
Boolean-based blind SQL injection

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 53

A penetration tester discovers that a web application uses unsensitized user input to dynamically generate file paths. The tester identifies that the application is vulnerable to Remote File Inclusion (RFI). Which action should the tester take to exploit this vulnerability?

A
Use directory traversal to access sensitive system files on the server
B
Upload a malicious shell to the server and execute commands remotely
C
Provide a URL pointing to a remote malicious script to include it in the web application
D
Inject a SQL query into the input field to perform SQL injection

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 54

A penetration tester is assessing a company's HR department for vulnerability to social engineering attacks using knowledge of recruitment and onboarding processes. What is the most effective technique to obtain network access credentials without raising suspicion?

A
Create a convincing fake onboarding portal that mimics the companyโ€™s internal systems
B
Develop a fake social media profile to connect with HR employees and request sensitive information
C
Conduct a phone call posing as a new employee to request password resets
D
Send a generic phishing email with a link to a fake HR policy document

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 55

Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks.

What is the type of threat intelligence collected by Arnold in the above scenario?

A
Strategic threat intelligence
B
Operational threat intelligence
C
Technical threat intelligence
D
Tactical threat intelligence

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 56

A penetration tester is testing a web application's product search feature, which takes user input and queries the database. The tester suspects the input is not properly sanitized. What is the best approach to confirm the presence of SQL injection?

A
Input '; DROP TABLE products; -- to see if the table is deleted
B
Inject a script like to test for Cross-Site Scripting (XSS)
C
Use directory traversal syntax to access restricted files on the server
D
Enter ' OR '1'='1 to check if all products are returned

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 57

A penetration tester is assessing an loT thermostat used in a smart home system. The device communicates with a cloud server for updates and commands. The tester discovers that communication between the device and the cloud server is not encrypted. What is the most effective way to exploit this vulnerability?

A
Execute a SQL injection attack on the cloud server's login page
B
Conduct a Cross-Site Scripting (XSS) attack on the thermostat's web interface
C
Use a man-in-the-middle (MitM) attack to intercept and manipulate unencrypted communication
D
Perform a brute-force attack on the thermostatโ€™s local admin login

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 58

This type of injection attack does not show any error message. It is difficult to exploit as it returns information when the application is given SQL payloads that elicit a true or false response from the server. By observing the response, an attacker can extract sensitive information.

What type of attack is this?

A
Union SQL injection
B
Error-based SQL injection
C
Time-based SQL injection
D
Blind SQL injection

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 59

An attacker extracts the initial bytes from an encrypted file container and uses a tool to iterate through numeric combinations. What type of cryptanalytic technique is being utilized?

A
Test every possible password through automation
B
Analyze output length to spot anomalies
C
Seek identical digests across hash outputs
D
Force encryption key through quantum solving

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 60

A penetration tester discovers that a web application uses unsanitized user input to dynamically generate file paths. The tester identifies that the application is vulnerable to Remote File Inclusion (RFI). Which action should the tester take to exploit this vulnerability?

A
Provide a URL pointing to a remote malicious script to include it in the web application
B
Inject a SQL query into the input field to perform SQL injection
C
Use directory traversal to access sensitive system files on the server
D
Upload a malicious shell to the server and execute commands remotely

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 61

Roma is a member of a security team. She was tasked with protecting the internal network of an organization from imminent threats. To accomplish this task, Roma fed threat intelligence into the security devices in a digital format to block and identify inbound and outbound malicious traffic entering the organization's network.

Which type of threat intelligence is used by Roma to secure the internal network?

A
Operational threat intelligence
B
Strategic threat intelligence
C
Tactical threat intelligence
D
Technical threat intelligence

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 62

A security researcher is analyzing a target organization's publicly accessible cloud infrastructure. While reviewing the website's HTML source code, the researcher discovers direct references to files hosted on Amazon S3. What is the most effective way to identify additional publicly accessible bucket URLs used by the target?

A
Exploit XSS to force the page to reveal the S3 links.
B
Perform packet sniffing to intercept internal S3 bucket names.
C
Use Google advanced search operators to enumerate S3 bucket URLs.
D
Use SQL injection to extract internal file paths from the database.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 63

During a targeted phishing campaign, an attacker gains access to a trusted internal system within a corporate network protected by advanced firewalls, IDS, and email security gateways. To maintain persistence and evade content inspection, the attacker crafts a malicious HTML email attachment containing obfuscated JavaScript code. When the user opens the attachment in a browser, a hidden JavaScript blob dynamically reconstructs a malware payload and triggers an automatic file download on the client side. No external connections are initiated during this process, making it difficult for network security tools to detect or block the attack. Which evasion technique is being employed to bypass the firewall and IDS protections?

A
Cross-site scripting
B
HTTP header spoofing
C
HTML smuggling
D
Port forwarding

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 64

Sam, a web developer, was instructed to incorporate a hybrid encryption software program into a web application to secure email messages. Sam used an encryption software, which is a free implementation of the OpenPGP standard that uses both symmetric-key cryptography and asymmetric-key cryptography for improved speed and secure key exchange.

What is the encryption software employed by Sam for securing the email messages?

A
PGP
B
SMTP
C
GPG
D
S/MIME

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 65

A security analyst investigates unusual east-west traffic on a corporate network. A previously MAC address is found actively communicating from a port connected to a trusted desktop. On closer inspection, a small computing device (Raspberry Pi) was physically inserted between the switch and the legitimate machine. This setup allows the rogue device to piggyback onto the network using the identity and privileges of the authenticated workstation without triggering any authentication processes or alarms. Which evasion technique is being used to blend unauthorized traffic with legitimate access?

A
Spoofing ARP responses from a dynamic IP allocation pool
B
Exploiting a wireless rogue access point to tunnel through the firewall
C
VLAN double tagging to shift between network segments
D
NAC bypass using a pre-authenticated device for network bridging

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 66

During a red team engagement simulating a targeted attack on a smart office environment, an ethical hacker identifies a thermostat used for regulating temperature across multiple floors. While analyzing its firmware management process, the tester discovers that the device accepts older versions without verifying their integrity or authenticity. The attacker successfully loads a previously deprecated firmware that contains known vulnerabilities and gains unauthorized access to the broader network by exploiting reintroduced flaws. No mechanisms are in place to prevent version rollback or verify firmware trustworthiness. Which loT security issue is most accurately demonstrated in this scenario?

A
Insecure network service exposure
B
Denial-of-service through physical tampering
C
Lack of secure update mechanisms
D
Use of insecure third-party components

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 67

Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?

A
Bluetooth
B
WPA2-Enterprise
C
WPA3-Personal
D
ZigBee

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 68

A university's online registration system is experiencing disruptions due to a DDoS attack that combines DNS reflection and HTTP slow Loris techniques. Standard firewalls and load balancers are unable to mitigate the attack without impacting legitimate users. To ensure uninterrupted registration services, which advanced mitigation strategy should the university implement?

A
Increase server bandwidth and implement basic rate limiting on all incoming traffic
B
Utilize a hybrid DDoS mitigation service that offers both on-premises and cloud-based protection
C
Configure the firewall to block all incoming DNS and HTTP requests from external IPs
D
Deploy an Intrusion Prevention System (IPS) with deep packet inspection capabilities

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 69

An ethical hacker needs to gather detailed information about a company's internal network without initiating any direct interaction that could be logged or raise suspicion. Which approach should be used to obtain this information covertly?

A
Inspect public WHOIS records for hidden network data
B
Analyze the company's SSL certificates for internal details
C
Utilize network scanning tools to map the company's IP range
D
Examine email headers from past communications with the company

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 70

Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.

Which of the following components of the Web Service Architecture is used by Rebecca for securing the communication?

A
WS-Work Processes
B
WS-Security
C
WS-Policy
D
WSDL

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 71

A penetration tester identifies that a web application's login form is not using secure password hashing mechanisms, allowing attackers to steal passwords if the database is compromised. What is the best approach to exploit this vulnerability?

A
Capture the login request using a proxy tool and attempt to decrypt the passwords
B
Perform a dictionary attack using a list of commonly used passwords against the stolen hash values
C
Conduct a brute-force attack on the login form to guess weak passwords
D
Input a SQL query to check for SQL Injection vulnerabilities in the login form

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 72

A penetration tester is tasked with uncovering historical content from a company's website, including previously exposed login portals or sensitive internal pages. Direct interaction with the live site is prohibited due to strict monitoring policies. To stay undetected, the tester decides to explore previously indexed snapshots of the organization's web content saved by external sources. Which approach would most effectively support this passive information-gathering objective?

A
Search with intext:"login" site:target.com to retrieve login data.
B
Use the link: operator to find backlinks to login portals.
C
Use the intitle:login operator to list current login pages.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 73

Calvin, a grey-hat hacker, targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login form of the web application, which requests users to feed data and specifies the incorrect field in case of invalid credentials. Later, Calvin uses this information to perform social engineering. Which of the following design flaws in the authentication mechanism is exploited by Calvin?

A
User impersonation
B
Insecure transmission of credentials
C
Password reset mechanism
D
Verbose failure messages

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 74

During a high-stakes engagement on a secure corporate network, a penetration tester discovers an opportunity to attack the domain controller. By abusing an API call from Microsoft's Encrypting File System Remote Protocol (MS-EFSRPC), the tester forces the domain controller to initiate NTLM authentication to a server controlled by the tester. The tester then captures the resulting NTLM hash and relays it to the Active Directory Certificate Services (AD CS), ultimately obtaining a certificate that confers administrative privileges over the network. This sophisticated method allows the tester to compromise the network without requiring direct access to the domain controller. Which network-level hijacking technique is illustrated in this scenario?

A
Exploiting vulnerabilities in TLS compression via a CRIME attack
B
Hijacking sessions using a PetitPotam relay attack
C
Stealing session tokens using browser-based exploits
D
Employing a session donation method to transfer tokens

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 75

During a comprehensive security audit of a financial institution's online infrastructure, a penetration tester observes abnormal traffic redirection patterns affecting the institution's primary domain. Customers who attempt to access the legitimate website are seamlessly redirected to a visually identical phishing page, hosted on a suspicious IP address. After tracing the DNS resolution path, the tester discovers that the authoritative DNS server has been compromised, and its records have been altered to point to the attacker's server. The redirection affects all DNS queries for the domain, indicating unauthorized control over name resolution infrastructure, rather than local cache poisoning or client-side manipulation. The tester confirms that this redirection was achieved by tampering with the DNS zone records themselves. Which technique is being used in this scenario?

A
Establish covert communication using DNS tunneling over standard DNS queries.
B
Perform DNS rebinding in the import functionality to manipulate browser-origin interactions.
C
Initiate a DNS amplification attack by leveraging recursive servers to flood the target.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 76

A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network.

What is this hacking process known as?

A
Wardriving
B
Spectrum analysis
C
Wireless sniffing
D
GPS mapping

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 77

During a physical penetration test simulating a social engineering attack, a threat actor walks into the lobby of a target organization dressed as a field technician from a known external vendor. Carrying a fake ID badge and referencing a known company name, the attacker confidently claims they've been dispatched to perform a routine server room upgrade. Using internal-sounding terminology and referencing real employee names gathered via OSINT, the individual conveys urgency. The receptionist, recognizing the vendor name and the convincing language, allows access without verifying the credentials.

A
Misconfigured network segmentation allowing unauthorized access.
B
Leaked credentials on public networks and forums.
C
Perceived authority and reliance on third-party familiarity.
D
Trust in physical security logs used by security teams.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 78

A company's online service is under a multi-vector DoS attack using both SYN floods and HTTP GET floods from a botnet. Standard firewalls and IDS are unable to prevent the outages. To mitigate the attack without disrupting legitimate traffic, which advanced defense should the company implement?

A
Configure the firewall to block all incoming SYN packets from external Ips
B
Use DDoS mitigation services that offer multi-layer protection
C
Increase server bandwidth and apply basic rate limiting
D
Deploy a Web Application Firewall (WAF) with anomaly detection

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 79

Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions.

Which of the following master components is explained in the above scenario?

A
Kube-apiserver
B
Etcd cluster
C
Kube-controller-manager
D
Kube-scheduler

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 80

While conducting a covert penetration test on a UNIX-based infrastructure, the tester decides to bypass Intrusion detection systems by sending specially crafted TCP packets with an unusual set of flags enabled. These packets do not initiate or complete any TCP handshake. During the scan, the tester notices that when certain ports are probed, there is no response from the target, but for others, a TCP RST (reset) packet is received. The tester notes that this behavior consistently aligns with open and closed ports, respectively, without triggering detection systems configured to monitor connection-based scans. Based on these observations, which scanning technique is most likely being used?

A
TCP Connect scan to complete the three-way handshake
B
FIN scan using stealthy flag combinations
C
Xmas scan leveraging RFC 793 quirks
D
ACK flag scan to evaluate firewall behavior

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 81

A cyber adversary is performing external reconnaissance on a large enterprise network with multiple perimeter defenses in place, including packet-filtering firewalls and intrusion detection systems (IDS). The goal is to enumerate the firewallโ€™s rule set to identify which TCP and UDP ports are permitted for inbound traffic to internal systems. To minimize noise and avoid immediate detection, the attacker wants to use a method that mimics normal traffic flows while providing insight into how the firewall handles packets based on port and protocol combinations. Which reconnaissance technique should the attacker choose to effectively map the firewall's filtering behavior without raising alerts?

A
Conducting full SYN scans on all ports for each discovered IP
B
Passive DNS monitoring to observe domain-to-IP relationships
C
Firewalking with manipulated TTL values to analyze ACL responses
D
Sending ICMP Echo requests to the network's broadcast address

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 82

Bill has been hired as a penetration tester and cyber security auditor for a major credit card company.

Which information security standard is most applicable to his role?

A
FISMA
B
Sarbanes-Oxley Act
C
HITECH
D
PCI-DSS

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 83

You're a security analyst conducting a foot printing exercise for a new client to uncover as much

information as possible without direct interaction. Your preliminary investigation using search engines and

public databases has provided a significant amount of data about the organization's online presence. You are now considering using Google Hacking techniques to find further vulnerabilities. Which of the following could best justify this decision?

A
Google Hacking can help identify weaknesses in the client's website code.
B
Google Hacking can help locate potential phishing sites that mimic the client's website.
C
Google Hacking can help discover hidden organizational data from the Deep Web.
D
Google Hacking can assist in mapping out the client's internal network structure.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 84

A penetration tester is assessing the security of a corporate wireless network that uses WPA2-Enterprise encryption with RADIUS authentication. The tester wants to perform a man-in-the-middle attack by tricking wireless clients into connecting to a rogue access point. What is the most effective method to achieve this?

A
Use a brute-force attack to crack the WPA2 encryption directly
B
Execute a Cross-Site Scripting (XSS) attack on the wireless controller's login page
C
Set up a fake access point with the same SSID and use a de-authentication attack
D
Perform a dictionary attack on the RADIUS server to retrieve credentials

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 85

Mirai malware targets IoT devices.

After infiltration, it uses them to propagate and create botnets that are then used to launch which types of attack?

A
MITM attack
B
Password attack
C
Birthday attack
D
DDoS attack

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 86

While performing a vulnerability assessment for XYZ Corporation, you discover that several key systems are regularly interacting with unidentified external entities. These interactions often involve data transfers, both incoming and outgoing. While some of these might be legitimate, the nature and volume of this unmonitored traffic raise concerns about potential data exfiltration or malware introduction. Given the ambiguous nature of these interactions and the high stakes involved, which strategy would most directly identify and mitigate the vulnerabilities associated with these unsanctioned exchanges?

A
Prioritize a behavioral analytics solution that profiles normal system behaviors and alerts on deviations, focusing on the interaction patterns of the identified systems.
B
Initiate a deep-dive forensic analysis on the systems involved, looking for signs of past breaches, malware, or unauthorized data manipulations.
C
Implement an aggressive zero-trust model across the board, cutting off all external interactions until each can be individually vetted and validated.
D
Institute for a company-wide training session on the dangers of unsolicited communications, hoping to curtail inadvertent employee engagements with external entities.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 87

During a red team exercise, a certified ethical hacker (CEH) is working on exploiting a potential vulnerability

in the target's web server. The CEH has completed the information gathering and footprinting stages and

mirrored the website for offline analysis. They have also discovered the server is prone to session hijacking.

Which next step is most likely to be part of a successful attack methodology, keeping in mind the requirement to minimize the possibility of detection?

A
Perform vulnerability scanning with automated tools to find additional weaknesses.
B
Attempt SQL Injection to extract database information.
C
Directly apply brute force attack to crack the server's password.
D
Hijack a session and immediately modify server configuration files.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 88

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.

What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

A
Reverse engineering
B
App sandboxing
C
Jailbreaking
D
Social engineering

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 89

A senior executive receives a personalized email with a subject line that reads "Annual Performance Review 2024." The email contains a downloadable PDF that installs a backdoor when opened. The email appears to come from the CEO and includes company branding. Which phishing method does this best illustrate?

A
Broad phishing sent to all employees
B
Pharming using DNS poisoning
C
Email clone attack with altered attachments
D
Whaling attack aimed at high-ranking personnel

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 90

A cybersecurity team at a multinational company notices unusual network traffic on their Bluetooth devices. It is suspected to be a Bluesnarfing attack, aimed at accessing unauthorized information from Bluetooth-enabled devices.

Which of the following would be the most effective countermeasure to prevent further unauthorized access?

A
Regularly update Bluetooth devices to the latest firmware versions.
B
Implement network-level encryption on all data transmission over Bluetooth.
C
Increase the complexity and length of the PIN codes on Bluetooth devices.
D
Disable 'Discoverable Mode" and activate "Non-discoverable Mode" on all Bluetooth devices.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 91

To hide the file on a Linux system, you have to start the filename with a specific character.

What is the character?

A
Tilde (~)
B
Underscore (_)
C
Period (.)
D
Exclamation mark (!)

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 92

A company's customer data stored in a cloud environment has been exposed due to an vulnerability. Which of the following types of attacks most likely led to this incident?

A
Side-channel attack on the hypervisor
B
Exploitation of misconfigured security groups
C
Brute force attack on user passwords
D
Denial Service (DoS) attack on cloud servers.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 93

An attacker performs DNS cache snooping using the dig command with the +norecurse flag against a

known DNS server. The server returns NOERROR but provides no answer to the query. What does this most likely suggest?

A
The DNS server failed to resolve the request.
B
The queried domain has expired and no longer exists.
C
The requested record was found in the cache and returned.
D
No client from the DNS server's network has recently accessed the domain.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 94

John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the IoT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of IoT devices and detect whether they are using the default, factory-set credentials.

What is the tool employed by John in the above scenario?

A
IoT Inspector
B
AT&T IoT Platform
C
IoTSeeker
D
Azure IoT Central

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 95

A multinational company is planning to integrate an IoT-based environmental control system for its manufacturing units worldwide. They engage a cybersecurity team to ensure that the new system remains secure from any potential threats. The cybersecurity team is tasked with identifying the most likely method an advanced persistent threat (APT) group might use to compromise the new IoT-based environmental control system. What is the most plausible attack vector?

A
The APT group will perform an encryption-based Man-in-the-Middle attack between the IoT devices and the control server.
B
The APT group will execute a DDoS attack to overload the network and gain control over the IoT devices.
C
The APT group will exploit zero-day vulnerabilities present in the IoT device firmware.
D
The APT group will infiltrate the network using compromised user credentials.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 96

A cybersecurity company wants to prevent attackers from gaining information about its encrypted traffic

patterns. Which of the following encryption algorithms should they utilize?

A
RSA
B
AES
C
DES
D
HMAC

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 97

Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication and integrity of messages being transmitted in the corporate network. To encrypt the messages, she implemented a security model in which every user in the network maintains a ring of public keys. In this model, a user needs to encrypt a message using the receiverโ€™s public key, and only the receiver can decrypt the message using their private key.

What is the security model implemented by Jane to secure corporate messages?

A
Zero trust network
B
Secure Socket Layer (SSL)
C
Transport Layer Security (TLS)
D
Web of trust (WOT)

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 98

After a recent breach, your team discovers that attackers used modified versions of legitimate system utilities and a Windows service to persist undetected for weeks, accessing internal credentials.

What key step can be taken to better protect against similar future threats?

A
Ensure all systems run the latest antivirus and firewall software.
B
Monitor file hashes of sensitive executables for unauthorized changes.
C
Disable unused ports and limit outbound traffic via firewall rules.
D
Conduct weekly backups and store them off-site.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 99

During a penetration test on a legacy Windows network, you use the nbtstat -A <IP> command on a target

system and retrieve several NetBIOS names, including entries ending with <20> and <03>. However, attempts to list shared folders fail. Which of the following best explains this behavior?

A
The host is not part of any Active Directory domain.
B
The target system's NetBIOS service is bound to a non-standard port.
C
The nbtstat utility cannot enumerate shares from NetBIOS names.
D
File and printer sharing is disabled on the target system.

Premium Solution Locked

Unlock all 921 answers & explanations

QUESTION 100

What is the following command used for?

A
Retrieving SQL statements being executed on the database
B
Creating backdoors using SQL injection
C
Enumerating the databases in the DBMS for the URL
D
Searching database statements at the IP address given

Premium Solution Locked

Unlock all 921 answers & explanations

Full Question Bank Locked

You have reached the end of the free study guide preview. Upgrade now to unlock all 921 questions and the full simulation engine.

Customer Reviews

5 / 5
(15,000+ verified)
5
100%
4
0%
3
0%
2
0%
1
0%

Global Community Feedback

DM

David M.

Verified Student

"The practice engine is incredible. It feels exactly like the real testing environment and helped me build so much confidence."

SJ

Sarah J.

Premium Member

"The PDF is very well organized and the explanations for the answers are actually helpful, not just random text."

MC

Michael C.

Verified Buyer

"I was skeptical, but the content is high quality and definitely worth the price. I passed on my first try!"

Need Assistance?

Our expert support team is available to assist you with any inquiries about our exam materials.

Contact Support
Average response: < 24 Hours

Get Exam Updates

Subscribe to receive instant notifications on new questions and exclusive flash sales.

* Join 5,000+ students getting weekly updates

Support Chat โ— Active Now

๐Ÿ‘‹ Hi! How can we help you pass your exam?

Enter email to start chatting