EC-Council Certified Ethical Hacker v13 312-50v13 Exam Questions in PDF

Free EC-Council 312-50v13 Dumps Questions (page: 14)

While browsing his Facebook feed, Matt sees a picture one of his friends posted with the caption, "Learn more about your friends!", as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate, Matt responds to the questions on the post. A few days later, Matt's bank account has been accessed, and the password has been changed.

What most likely happened?

  1. Matt inadvertently provided the answers to his security questions when responding to the post.
  2. Matt inadvertently provided his password when responding to the post.
  3. Matt's computer was infected with a keylogger.
  4. Matt's bank account login information was brute forced.

Answer(s): A

Explanation:

Matt’s responses to the post likely revealed security questions’ answers, enabling social engineering to access his bank. A) Correct: posting “Learn more about your friends” and answering questions supplied by a trusted contact provided the exact security questions/answers needed for account recovery or authentication, enabling attacker to impersonate Matt. B) Incorrect: there’s no evidence he disclosed his login credentials; only security-question answers were provided. C) Incorrect: keylogger would capture keystrokes locally, not rely on friend’s social-media questions. D) Incorrect: brute-forcing requires password or data access; it’s less plausible given social-engineering leakage of security-question data.



Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMv1 by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks.

What is the type of attack performed by Simon?

  1. Combinator attack
  2. Dictionary attack
  3. Rainbow table attack
  4. Internal monologue attack

Answer(s): D

Explanation:

The attack is an Internal monologue attack because the attacker leverages legitimate credentials and session tokens from active processes to impersonate a valid user and continue compromising the environment without immediate detection.
A) Combinator attack is incorrect as it pertains to combining partial credentials or data to guess a password, not token harvesting or credential impersonation.
B) Dictionary attack is incorrect since it uses a list of words to guess passwords, not extracting tokens to masquerade as a user.
C) Rainbow table attack is incorrect because it uses precomputed hash chains to crack passwords, not live token reuse or process token extraction.
D) Internal monologue attack



Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company.

What is the social engineering technique Steve employed in the above scenario?

  1. Baiting
  2. Piggybacking
  3. Diversion theft
  4. Honey trap

Answer(s): A

Explanation:

Steve used social media deception to lure and extract sensitive information by creating a fake online identity and gradually gaining trust. This aligns with baiting, where a deceptive lure entices victims to disclose information or perform actions.
A) Baiting: correct - attacker uses a counterfeit profile to entice information disclosure over time.
B) Piggybacking: incorrect - involves unauthorized access by following an authorized user, not social media manipulation.
C) Diversion theft: incorrect - typically refers to misdirection of funds or valuables, not information harvesting via profiles.
D) Honey trap: incorrect - implies a trap designed to entrap a target for a physical or explicit purpose; social-engineering lure on a profile qualifies as baiting rather than a honey trap.



Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?

  1. Exploration
  2. Investigation
  3. Reconnaissance
  4. Enumeration

Answer(s): C

Explanation:

A short description: The time spent researching to locate information about a company for social engineering is Reconnaissance.
A) Exploration — not the standard term used in infoSec for targeted info gathering during an attack.
B) Investigation — generic term; lacks the canonical connect to attacker information gathering phases.
C) Reconnaissance — correct; aligns with identifying and collecting open-source intel about targets to craft credible phishing.
D) Enumeration — typically involves active probing to reveal services/accounts, not passive data gathering for social engineering.



Attacker Lauren has gained the credentials of an organization's internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited.

What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?

  1. Incident triage
  2. Preparation
  3. Incident recording and assignment
  4. Eradication

Answer(s): A

Explanation:

The correct answer is A) incident triage because it involves quickly assessing incident details (type, severity, target, impact, propagation, vulnerabilities) to determine priority and response actions.
B) Preparation is the proactive phase (policies, tools, training) taken before incidents occur, not the analysis of an actual event.
C) Incident recording and assignment focuses on documenting events and assigning handlers, not initial risk assessment of the incident.
D) Eradication is the containment and removal of threats after triage and containment, not the initial analysis and classification step.



At what stage of the cyber kill chain theory model does data exfiltration occur?

  1. Weaponization
  2. Actions on objectives
  3. Command and control
  4. Installation

Answer(s): B

Explanation:

Exfiltration occurs during Actions on Objectives, when the attacker achieves the intended mission and transfers data out of the target environment.
A) Weaponization is the pairing of exploit and payload, prior to intrusion.
C) Command and control is the stage for maintaining access and data channels, not the actual data transfer out.
D) Installation involves deploying malware on the host, enabling foothold, not the data exfiltration phase.



Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson's machine.

What is the social engineering technique Steve employed in the above scenario?

  1. Diversion theft
  2. Quid pro quo
  3. Elicitation
  4. Phishing

Answer(s): C

Explanation:

A short summary: Elicitation is used to coax information by building rapport and prompting the target to reveal details or follow instructions, which fits Johnson’s deceptive interactions to obtain access and data.
A) Diversion theft - Incorrect: Involves stealing physical assets by distracting the victim; not used to obtain information or induce malware installation.
B) Quid pro quo - Incorrect: Involves offering a benefit in exchange for information or actions; here the attacker did not promise a return benefit beyond coercive instruction.
C) Elicitation - Correct: Social engineering through conversation to extract sensitive data and entice execution of malicious steps.
D) Phishing - Incorrect: Typically involves fraudulent emails/websites; here the attacker directly contacted and guided the victim rather than lure via deceitful messages.



An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security testing and to guard the organization's web infrastructure against web-application threats. Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks.

Which of the following security scanners will help John perform the above task?

  1. AlienVault® OSSIMTM
  2. Syhunt Hybrid
  3. Saleae Logic Analyzer
  4. Cisco ASA

Answer(s): B

Explanation:

A short summary: Syhunt Hybrid is a web application security scanner capable of automated testing for XSS, SQLi, directory traversal, fault injection, and command execution, matching John’s needs.
A) AlienVault OSSIM is a SIEM/OTM/IDS platform for security monitoring, not primarily a web app vulnerability scanner.
B) Syhunt Hybrid performs automated web application security testing, including XSS, SQL injection, directory traversal, and fault injection.
C) Saleae Logic Analyzer is a hardware logic analyzer for embedded systems, not a web application security scanner.
D) Cisco ASA is a network firewall appliance, not a web app vulnerability scanner.



Share your comments for EC-Council 312-50v13 exam with other users:

J
john adenu
11/14/2023 11:02:00 AM

nice questions bring out the best in you.

O
Osman
11/21/2023 2:27:00 PM

really helpful

E
Edward
9/13/2023 5:27:00 PM

question #50 and question #81 are exactly the same questions, azure site recovery provides________for virtual machines. the first says that it is fault tolerance is the answer and second says disater recovery. from my research, it says it should be disaster recovery. can anybody explain to me why? thank you

M
Monti
5/24/2023 11:14:00 PM

iam thankful for these exam dumps questions, i would not have passed without this exam dumps.

A
Anon
10/25/2023 10:48:00 PM

some of the answers seem to be inaccurate. q10 for example shouldnt it be an m custom column?

P
PeterPan
10/18/2023 10:22:00 AM

are the question real or fake?

C
CW
7/11/2023 3:19:00 PM

thank you for providing such assistance.

M
Mn8300
11/9/2023 8:53:00 AM

nice questions

N
Nico
4/23/2023 11:41:00 PM

my 3rd purcahse from this site. these exam dumps are helpful. very helpful.

C
Chere
9/15/2023 4:21:00 AM

found it good

T
Thembelani
5/30/2023 2:47:00 AM

excellent material

V
vinesh phale
9/11/2023 2:51:00 AM

very helpfull

B
Bhagiii
11/4/2023 7:04:00 AM

well explained.

R
Rahul
8/8/2023 9:40:00 PM

i need the pdf, please.

C
CW
7/11/2023 2:51:00 PM

a good source for exam preparation

A
Anchal
10/23/2023 4:01:00 PM

nice questions

J
J Nunes
9/29/2023 8:19:00 AM

i need ielts general training audio guide questions

A
Ananya
9/14/2023 5:16:00 AM

please make this content available

S
Swathi
6/4/2023 2:18:00 PM

content is good

L
Leo
7/29/2023 8:45:00 AM

latest dumps please

L
Laolu
2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.

Z
Zaynik
9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer

M
Massam
6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump

A
Anonymous
12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.

J
Japles
5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.

F
Faritha
8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures

A
Anonymous
9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i

P
p das
12/7/2023 11:41:00 PM

very good questions

A
Anna
1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?

B
Bhavya
9/13/2023 10:15:00 AM

very usefull

R
Rahul Kumar
8/31/2023 12:30:00 PM

need certification.

D
Diran Ole
9/17/2023 5:15:00 PM

great exam prep

V
Venkata Subbarao Bandaru
6/24/2023 8:45:00 AM

i require dump

D
D
7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,

AI Tutor 👋 I’m here to help!