EC-Council 312-50v13 Practice Exams
Last updated on Apr 01,2025- Exam Code: 312-50v13
- Exam Name: Certified Ethical Hacker Exam (CEHv13)
- Certification Provider: EC-Council
- Latest update: Apr 01,2025
A penetration tester is performing the footprinting process and is reviewing publicly available information about an organization by using the Google search engine.
Which of the following advanced operators would allow the pen tester to restrict the search to the organization’s web domain?
- A . [allinurl:]
- B . [location:]
- C . [site:]
- D . [link:]
Which file is a rich target to discover the structure of a website during web-server footprinting?
- A . Document root
- B . Robots.txt
- C . domain.txt
- D . index.html
Which file is a rich target to discover the structure of a website during web-server footprinting?
- A . Document root
- B . Robots.txt
- C . domain.txt
- D . index.html
Being a Certified Ethical Hacker (CEH), a company has brought you on board to evaluate the safety measures in place for their network system. The company uses a network time protocol server in the demilitarized zone.
During your enumeration, you decide to run a ntptrace command. Given the syntax: ntptrace [-n] [-m maxhosts] [servername/IP_address], which command usage would best serve your objective to find where the NTP server obtains the time from and to trace the list of NTP servers connected to the network?
- A . ntptrace -m 5 192.168.1.1
- B . tptrace 192.1681.
- C . ntptrace -n localhost
- D . ntptrace -n -m 5 192.168.1.1
An LDAP directory can be used to store information similar to a SQL database. LDAP uses a _____ database structure instead of SQL’s _____ structure. Because of this, LDAP has difficulty representing
many-to-one relationships.
- A . Relational, Hierarchical
- B . Strict, Abstract
- C . Hierarchical, Relational
- D . Simple, Complex
Which is the first step followed by Vulnerability Scanners for scanning a network?
- A . OS Detection
- B . Firewall detection
- C . TCP/UDP Port scanning
- D . Checking if the remote host is alive
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
- A . There is no way to tell because a hash cannot be reversed
- B . The right most portion of the hash is always the same
- C . The hash always starts with AB923D
- D . The left most portion of the hash is always the same
- E . A portion of the hash will be all 0’s
Which of the following is a passive wireless packet analyzer that works on Linux-based systems?
- A . Burp Suite
- B . OpenVAS
- C . tshark
- D . Kismet
Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet.
He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?
- A . Known plaintext
- B . Password spraying
- C . Brute force
- D . Dictionary
Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet.
He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?
- A . Known plaintext
- B . Password spraying
- C . Brute force
- D . Dictionary