Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

312-50v13 Exam Dumps - Certified Ethical Hacker Exam (CEHv13)

Searching for workable clues to ace the ECCouncil 312-50v13 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 312-50v13 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 57

A penetration tester discovers that a system is infected with malware that encrypts all files and demands payment for decryption. What type of malware is this?

A.

Worm

B.

Spyware

C.

Keylogger

D.

Ransomware

Full Access
Question # 58

During a red team simul-ation, an attacker crafts packets with malformed checksums so the IDS accepts them but the target silently discards them. Which evasion technique is being employed?

A.

Insertion attack

B.

Polymorphic shellcode

C.

Session splicing

D.

Fragmentation attack

Full Access
Question # 59

During a black-box penetration test, an attacker runs the following command:

nmap -p25 --script smtp-enum-users --script-args EXPN,RCPT < target IP >

The script successfully returns multiple valid usernames. Which server misconfiguration is being exploited?

A.

The SMTP server allows authentication without credentials

B.

The SMTP server has disabled STARTTLS, allowing plaintext enumeration

C.

SMTP user verification commands are exposed without restrictions

D.

DNS MX records point to an internal mail relay

Full Access
Question # 60

A penetration tester is tasked with assessing the security of an Android mobile application that stores sensitive user data. The tester finds that the application does not use proper encryption to secure data at rest. What is the most effective way to exploit this vulnerability?

A.

Access the local storage to retrieve sensitive data directly from the device

B.

Use SQL injection to retrieve sensitive data from the backend server

C.

Execute a Cross-Site Scripting (XSS) attack to steal session cookies

D.

Perform a brute-force attack on the application ' s login credentials

Full Access
Question # 61

During a stealth penetration test at a defense research facility, ethical hacker Daniel installs a payload that survives even after multiple operating system reinstalls. The implant resides deep inside the system hardware and executes before the OS is loaded, ensuring that forensic scans and antivirus tools at the OS level cannot detect or remove it. Administrators notice unusual activity on network cards and storage devices, but repeated scans show no malware traces within the file system.

Which type of rootkit most likely enabled this level of persistence?

A.

Boot-Loader-Level Rootkit

B.

Hypervisor-Level Rootkit

C.

Kernel-Level Rootkit

D.

Hardware/Firmware Rootkit

Full Access
Question # 62

During enumeration, a tool sends requests to UDP port 161 and retrieves a large list of installed software due to a publicly known community string. What enabled this technique to work so effectively?

A.

Unencrypted FTP services storing software data

B.

The SNMP agent allowed anonymous bulk data queries due to default settings

C.

Remote access to encrypted Windows registry keys

D.

SNMP trap messages logged in plain text

Full Access
Question # 63

During a cloud security assessment, you discover a former employee still has access to critical cloud resources months after leaving. Which practice would most effectively prevent this?

A.

Real-time traffic analysis

B.

Regular penetration testing

C.

Enforcing timely user de-provisioning

D.

Multi-cloud deployment

Full Access
Question # 64

In the bustling financial hub of Charlotte, North Carolina, ethical hacker Raj Patel is contracted by TrustBank, a regional US bank, to evaluate their online loan application portal. On April 22, 2025, Raj tests a feature allowing customers to upload structured financial documents for loan processing. By submitting a specially crafted document, he triggers a response that exposes internal server file paths and sensitive configuration data, including database connection strings. The issue arises from the portal ' s handling of external references in document parsing, not from response manipulation, authentication weaknesses, or undetected attack attempts. Raj compiles a detailed report to assist TrustBank ' s security team in mitigating the vulnerability.

Which type of vulnerability is Raj most likely exploiting in TrustBank ' s online loan application portal?

A.

Identification and Authentication Failures

B.

HTTP Response Splitting

C.

XML External Entity (XXE) Injection

D.

Security Logging and Monitoring Failures

Full Access
Go to page: