EC-Council 312-50v13 Exam
Certified Ethical Hacker v13 (Page 11 )

Updated On: 12-Feb-2026

Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

  1. Scanning
  2. Gaining access
  3. Maintaining access
  4. Reconnaissance

Answer(s): B



Larry, a security professional in an organization, has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server.

Which of the following countermeasures must Larry implement to secure the user accounts on the web server?

  1. Retain all unused modules and application extensions.
  2. Limit the administrator or root-level access to the minimum number of users.
  3. Enable all non-interactive accounts that should exist but do not require interactive login.
  4. Enable unused default user accounts created during the installation of an OS.

Answer(s): B



There are multiple cloud deployment options depending on how isolated a customer’s resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution is for a customer to join with a group of users or organizations to share a cloud environment.

What is this cloud deployment option called?

  1. Private
  2. Community
  3. Public
  4. Hybrid

Answer(s): B



Allen, a professional pen tester, was hired by XpertTech Solutions to perform an attack simulation on the organization’s network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. By enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration.

Identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?

  1. <00>
  2. <20>
  3. <03>
  4. <1B>

Answer(s): C



Don, a student, came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app.

What is the attack performed on Don in the above scenario?

  1. SIM card attack
  2. Clickjacking
  3. SMS phishing attack
  4. Agent Smith attack

Answer(s): D






Post your Comments and Discuss EC-Council 312-50v13 exam prep with other Community members:

Join the 312-50v13 Discussion