Download Certified Ethical Hacker v13.312-50v13.Marks4Sure.2026-04-07.514q.vcex

Vendor: ECCouncil
Exam Code: 312-50v13
Exam Name: Certified Ethical Hacker v13
Date: Apr 07, 2026
File Size: 6 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Under what conditions does a secondary name server request a zone transfer from a primary name server?
  1.  When a primary SOA is higher that a secondary SOA
  2.  When a secondary SOA is higher that a primary SOA
  3.  When a primary name server has had its service restarted
  4.  When a secondary name server has had its service restarted
  5.  When the TTL falls to zero
Correct answer: A
Question 2
An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?
  1.  Protocol analyzer
  2.  Network sniffer
  3.  Intrusion Prevention System (IPS)
  4.  Vulnerability scanner
Correct answer: A
Question 3
The collection of potentially actionable, overt, and publicly available information is known as
  1.  Open-source intelligence
  2.  Real intelligence
  3.  Social intelligence
  4.  Human intelligence
Correct answer: A
Question 4
Which of the following is a component of a risk assessment?
  1.  Administrative safeguards
  2.  Physical security
  3.  DMZ
  4.  Logical interface
Correct answer: A
Question 5
Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?
  1.  Scanning
  2.  Footprinting
  3.  Enumeration
  4.  System Hacking
Correct answer: B
Question 6
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?
  1.  Wireshark
  2.  Ettercap
  3.  Aircrack-ng
  4.  Tcpdump
Correct answer: B
Question 7
Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?
  1.  Interceptor
  2.  Man-in-the-middle
  3.  ARP Proxy
  4.  Poisoning Attack
Correct answer: B
Question 8
While using your bank’s online servicing you notice the following string in the URL bar:
“http: // www. MyPersonalBank. com/ account?id=368940911028389&Damount=10980&Camount=21”
You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflects the changes.
Which type of vulnerability is present on this site?
  1.  Cookie Tampering
  2.  SQL Injection
  3.  Web Parameter Tampering
  4.  XSS Reflection
Correct answer: C
Question 9
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?
  1.  symmetric algorithms
  2.  asymmetric algorithms
  3.  hashing algorithms
  4.  integrity algorithms
Correct answer: C
Question 10
What tool can crack Windows SMB passwords simply by listening to network traffic?
  1.  This is not possible
  2.  Netbus
  3.  NTFSDOS
  4.  L0phtcrack
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!