312-50v13

Practice 312-50v13 Exam

Is it difficult for you to decide to purchase EC-Council 312-50v13 exam dumps questions? CertQueen provides FREE online Certified Ethical Hacker Exam (CEHv13) 312-50v13 exam questions below, and you can test your 312-50v13 skills first, and then decide whether to buy the full version or not. We promise you get the following advantages after purchasing our 312-50v13 exam dumps questions.
1.Free update in ONE year from the date of your purchase.
2.Full payment fee refund if you fail 312-50v13 exam with the dumps

 

 Full 312-50v13 Exam Dump Here

Latest 312-50v13 Exam Dumps Questions

The dumps for 312-50v13 exam was last updated on May 26,2025 .

Viewing page 1 out of 22 pages.

Viewing questions 1 out of 112 questions

Question#1

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

A. nessus
B. tcpdump
C. ethereal
D. jack the ripper

Explanation:
Tcpdump is a data-network packet analyzer computer program that runs under a command-line interface. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Distributed under the BSD license, tcpdump is free software.
https://www.wireshark.org/
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. NOTE: Wireshark is very similar to tcpdump, but has a graphical front-end, plus some integrated sorting and filtering options.

Question#2

A sophisticated attacker targets your web server with the intent to execute a Denial of Service (DoS) attack. His strategy involves a unique mixture of TCP SYN, UDP, and ICMP floods, using 'r' packets per second. Your server, reinforced with advanced security measures, can handle 'h' packets per second before it starts showing signs of strain. If 'r' surpasses 'h', it overwhelms the server, causing it to become unresponsive. In a peculiar pattern, the attacker selects 'r' as a composite number and 'h' as a prime number, making the attack detection more challenging.
Considering 'r=2010' and different values for 'h', which of the following scenarios would potentially cause the server to falter?

A. h=1999 (prime): Despite the attacker's packet flood, the server can handle these requests, remaining responsive
B. h=2003 (prime): The server can manage more packets than the attacker is sending, hence it stays operational
C. h=1993 (prime): Despite being less than 'r', the server's prime number capacity keeps it barely operational, but the risk of falling is imminent
D. h=1987 (prime): The attacker's packet rate exceeds the server's capacity, causing potential unresponsiveness

Explanation:
A Denial of Service (DoS) attack is a type of cyberattack that aims to make a machine or network resource unavailable to its intended users by flooding it with traffic or requests that consume its resources. A TCP SYN flood attack is a type of DoS attack that exploits the TCP handshake process by sending a large number of SYN requests to the target server, without completing the connection. A UDP flood attack is a type of DoS attack that sends a large number of UDP packets to random ports on the target server, forcing it to check for the application listening at that port and reply with an ICMP packet. An ICMP flood attack is a type of DoS attack that sends a large number of ICMP packets, such as ping requests, to the target server, overwhelming its ICMP processing capacity.
The attacker’s strategy involves a unique mixture of TCP SYN, UDP, and ICMP floods, using ‘r’ packets per second. The server can handle ‘h’ packets per second before it starts showing signs of strain. If ‘r’ surpasses ‘h’, it overwhelms the server, causing it to become unresponsive. The attacker selects ‘r’ as a composite number and ‘h’ as a prime number, making the attack detection more challenging. This is because prime numbers are less predictable and more difficult to factorize than composite numbers, which may hinder the analysis of the attack pattern.
Considering ‘r=2010’ and different values for ‘h’, the scenario that would potentially cause the server to falter is the one where ‘h=1987’ (prime). This is because ‘r’ is greater than ‘h’ by 23 packets per second, which means the server cannot handle the incoming traffic and will eventually run out of resources. The other scenarios would not cause the server to falter, as ‘h’ is either greater than or very close to ‘r’, which means the server can either manage or barely cope with the incoming traffic.
Reference: What is a denial-of-service (DoS) attack? | Cloudflare
Denial-of-Service (DoS) Attack: Examples and Common Targets - Investopedia
DDoS Attack Types: Glossary of Terms
What is a Denial of Service (DoS) Attack? | Webopedia

Question#3

Stephen, an attacker, targeted the industrial control systems of an organization. He generated a fraudulent email with a malicious attachment and sent it to employees of the target organization. An employee who manages the sales software of the operational plant opened the fraudulent email and clicked on the malicious attachment. This resulted in the malicious attachment being downloaded and malware being injected into the sales software maintained in the victim's system. Further, the malware propagated itself to other networked systems, finally damaging the industrial automation components.
What is the attack technique used by Stephen to damage the industrial systems?

A. Spear-phishing attack
B. SMishing attack
C. Reconnaissance attack
D. HMI-based attack

Question#4

What is the least important information when you analyze a public IP address in a security alert?

A. DNS
B. Whois
C. Geolocation
D. ARP

Question#5

if you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST.
What do you know about the firewall you are scanning?

A. There is no firewall in place.
B. This event does not tell you encrypting about the firewall.
C. It is a stateful firewall
D. It Is a non-stateful firewall.

Exam Code: 312-50v13         Q & A: 572 Q&As         Updated:  May 26,2025

 

 Full 312-50v13 Exam Dumps Here