Online 312-50v13 Practice TestMore EC-Council Products >

Free EC-Council 312-50v13 Exam Dumps Questions

EC-Council 312-50v13: Certified Ethical Hacker v13

- Get instant access to 312-50v13 practice exam questions

- Get ready to pass the Certified Ethical Hacker v13 exam right now using our EC-Council 312-50v13 exam package, which includes EC-Council 312-50v13 practice test plus an EC-Council 312-50v13 Exam Simulator.

- The best online 312-50v13 exam study material and preparation tool is here.

4.5 
(8730 ratings)

Question 1

- (Topic 3)
An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization deckled to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware. Which of the following tools must the organization employ to protect its critical infrastructure?

Correct Answer:C
Source: https://www.flowmon.com
Flowmon empowers manufacturers and utility companies to ensure the reliability of their industrial networks confidently to avoid downtime and disruption of service continuity. This can be achieved by continuous monitoring and anomaly detection so
that malfunctioning devices or security incidents, such as cyber espionage, zero- days, or
malware, can be reported and remedied as quickly as possible.

Question 2

- (Topic 2)
Ethical backer jane Doe is attempting to crack the password of the head of the it department of ABC company. She Is utilizing a rainbow table and notices upon entering a password that extra characters are added to the password after submitting. What countermeasure is the company using to protect against rainbow tables?

Correct Answer:B
Passwords are usually delineated as ??hashed and salted??. salting is simply the addition of a unique, random string of characters renowned solely to the site to every parole before it??s hashed, typically this ??salt?? is placed in front of each password.
The salt value needs to be hold on by the site, which means typically sites use the same salt for each parole. This makes it less effective than if individual salts are used.
The use of unique salts means that common passwords shared by multiple users – like ??123456?? or ??password?? – aren??t revealed revealed when one such hashed password is known – because despite the passwords being the same the immediately and hashed values are not.
Large salts also protect against certain methods of attack on hashes, including rainbow tables or logs of hashed passwords previously broken.
Both hashing and salting may be repeated more than once to increase the issue in breaking the security.

Question 3

- (Topic 1)
What does the –oX flag do in an Nmap scan?

Correct Answer:C
https://nmap.org/book/man-output.html
-oX <filespec> - Requests that XML output be directed to the given filename.

Question 4

- (Topic 3)
Stephen, an attacker, targeted the industrial control systems of an organization. He generated a fraudulent email with a malicious attachment and sent it to employees of the target organization. An employee who manages the sales software of the operational plant opened the fraudulent email and clicked on the malicious attachment. This resulted in the malicious attachment being downloaded and malware being injected into the sales software maintained in the victim's system. Further, the malware propagated itself to other networked systems, finally damaging the industrial automation components. What is the attack technique used by Stephen to damage the industrial systems?

Correct Answer:A

Question 5

- (Topic 2)
John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the IDAP service for sensitive information such as usernames. addresses, departmental details, and server names to launch further attacks on the target organization.
What is the tool employed by John to gather information from the IDAP service?

Correct Answer:A
JXplorer could be a cross platform LDAP browser and editor. it??s a standards compliant general purpose LDAP client which will be used to search, scan and edit any
commonplace LDAP directory, or any directory service with an LDAP or DSML interface. It is extremely flexible and can be extended and custom in a very number of the way.
JXplorer is written in java, and also the source code and source code build system ar obtainable via svn or as a packaged build for users who wish to experiment or any develop the program.
JX is is available in 2 versions; the free open source version under an OSI Apache two style licence, or within the JXWorkBench Enterprise bundle with inbuilt reporting, administrative and security tools.
JX has been through a number of different versions since its creation in 1999; the foremost recent stable release is version 3.3.1, the August 2013 release.
JXplorer could be a absolutely useful LDAP consumer with advanced security integration and support for the harder and obscure elements of the LDAP protocol. it??s been tested on Windows, Solaris, linux and OSX, packages are obtainable for HPUX, AIX, BSD and it should run on any java supporting OS.

Question 6

- (Topic 2)
This kind of password cracking method uses word lists in combination with numbers and special characters:

Correct Answer:A

START 312-50v13 EXAM