Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

312-50v13Free trialFree trial

By eccouncil
Aug, 2025

Verified

25Q per page

Question 51

As a Certified Ethical Hacker, you are conducting a footprinting and reconnaissance operation against a target organization. You discover a range of IP addresses associated with the target using the SecurityTrails tool. Now, you need to perform a reverse DNS lookup on these IP addresses to find the associated domain names, as well as determine the nameservers and mail exchange (MX) records. Which of the following DNSRecon commands would be most effective for this purpose?

  • A: dnsrecon -r 192.168.1.0/24 -n nsl.example.com -t axfr
  • B: dnsrecon -r 10.0.0.0/24 -n nsl.example.com -t zonewalk
  • C: dnsrecon -r 162.241.216.0/24 -n nsl.example.com -t std
  • D: dnsrecon -r 162.241.216.0/24 -d example.com -t brt

Question 52

You are an ethical hacker tasked with conducting an enumeration of a company's network. Given a Windows Answered Marked for Review 37.6% system with NetBIOS enabled, port 139 open, and file and printer sharing active, you are about to run some nbtstat commands to enumerate NetBIOS names. The company uses IPv6 for its network. Which of the following actions should you take next?

  • A: Switch to an enumeration tool that supports IPv6
  • B: Use nbtstat -a followed by the IPv6 address of the target machine
  • C: Use nbtstat -c to get the contents of the NetBIOS name cache
  • D: Utilize Nmap Scripting Engine (NSE) for NetBIOS enumeration

Question 53

During a red team assessment, a CEH is given a task to perform network scanning on the target network without revealing its IP address. They are also required to find an open port and the services available on the target machine. What scanning technique should they employ, and which command in Zenmap should they use?

  • A: Use SCTP INIT Scan with the command "-sY"
  • B: Use UDP Raw ICMP Port Unreachable Scanning with the command "-sU"
  • C: Use the ACK flag probe scanning technique with the command "-sA"
  • D: Use the IDLE/IPID header scan technique with the command "-sI"

Question 54

A large corporation is planning to implement preventive measures to counter a broad range of social engineering techniques. The organization has implemented a signature-based IDS, intrusion detection system, to detect known attack payloads and network flow analysis to monitor data entering and leaving the network. The organization is deliberating on the next step. Considering the information provided about various social engineering techniques, what should be the organization's next course of action?

  • A: Implement endpoint detection and response solution to oversee endpoint activities
  • B: Set up a honeypot to attract potential attackers into a controlled environment for analysis
  • C: Deploy more security personnel to physically monitor key points of access
  • D: Organize regular employee awareness training regarding social engineering techniques and preventive measures

Question 55

An audacious attacker is targeting a web server you oversee. He intends to perform a Slow HTTP POST attack, by manipulating 'a' HTTP connection. Each connection sends a byte of data every 'b' second, effectively holding up the connections for an extended period. Your server is designed to manage 'm' connections per second, but any connections exceeding this number tend to overwhelm the system. Given 'a=100' and variable 'm', along with the attacker's intention of maximizing the attack duration 'D=a*b', consider the following scenarios. Which is most likely to result in the longest duration of server unavailability?

  • A: m=90, b=15: The server can manage 90 connections per second, but the attacker's 100 connections exceed this, and with each connection held up for 15 seconds, the attack duration could be significant.
  • B: m=105, b=12: The server can manage 105 connections per second, more than the attacker's 100 connections, likely maintaining operation despite a moderate hold-up time.
  • C: m=110, b=20: Despite the attacker sending 100 connections, the server can handle 110 connections per second, therefore likely staying operative, regardless of the hold-up time per connection.
  • D: m=95, b=10: Here, the server can handle 95 connections per second, but it falls short against the attacker's 100 connections, albeit the hold-up time per connection is lower.

That’s the end of your free questions

You’ve reached the preview limit for 312-50v13

Consider upgrading to gain full access!

Page 3 of 11 • Questions 51-75 of 274

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!