EC-Council 312-50v13 Exam Questions
Certified Ethical Hacker v13 (Page 14 )

Updated On: 12-May-2026

What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?

  1. Performing content enumeration using the bruteforce mode and 10 threads
  2. Performing content enumeration using the bruteforce mode and random file extensions
  3. Skipping SSL certificate verification
  4. Performing content enumeration using a wordlist

Answer(s): D

Explanation:

Content enumeration is fastest when using a wordlist with Gobuster to enumerate common paths and directories efficiently against the target.
A) Using bruteforce mode with 10 threads is slower and less focused than a targeted wordlist approach, and increasing threads may cause throttling or bans.
B) Bruteforce with random file extensions lacks targeting and can blow up search space, reducing speed and relevance.
C) Skipping SSL certificate verification does not affect enumeration speed or coverage.
D) Using a wordlist directly targets likely paths, delivering rapid, scalable results compared to random or brute-force approaches.



When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration.

What type of an alert is this?

  1. False negative
  2. True negative
  3. True positive
  4. False positive

Answer(s): D

Explanation:

An alert triggered by accessing the router from the administrator’s computer to update configuration is a benign or expected action, but the IDS flagged it as an alert, making it a false positive.
A) False negative — wrong: a false negative would be an actual threat not detected by the IDS.
B) True negative — wrong: true negative means no threat and no alert when there is none; here an alert occurred.
C) True positive — wrong: true positive means the IDS correctly detected a real intrusion or malicious activity.
D) False positive — correct: the IDS generated an alert for legitimate administrative activity.



Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB, which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mib or by entering the DNS library name and Lseries.mib. He is currently retrieving information from an MIB that contains object types for workstations and server services.

Which of the following types of MIB is accessed by Garry in the above scenario?

  1. LNMIB2.MIB
  2. DHCP.MIB
  3. MIB_II.MIB
  4. WINS.MIB

Answer(s): A

Explanation:

Garry is accessing an MIB that defines workstation and server service object types, which aligns with the LNMIB2.MIB naming context typically associated with legacy network management domains for workstations and servers. A) LNMIB2.MIB is correct because it corresponds to MIB content describing workstation/server-related objects accessible via MIB names like Lseries.mib in the scenario. B) DHCP.MIB would describe DHCP-related objects, not workstation/server services. C) MIB_II.MIB is a general second version of standard MIB objects, not specifically workstation and server service types. D) WINS.MIB covers WINS name resolution, not broad workstation/server service objects.



Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks.

What is the tool employed by James in the above scenario?

  1. ophcrack
  2. VisualRoute
  3. Hootsuite
  4. HULK

Answer(s): C

Explanation:

The tool used is Hootsuite, which is a social media management platform often associated with monitoring and aggregating public posts, including geotagged data, to profile individuals for targeted information gathering.
A) ophcrack is a Windows password cracker, not used for social media or geolocation discovery.
B) VisualRoute is a network path and latency diagnostic tool, not for social media surveillance.
C) Hootsuite performs social media monitoring and analysis, aligning with gathering publicly shared information.
D) HULK is a web vulnerability testing tool for enumerating sites, not for geolocation or social media data collection.



Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _______________ to encrypt the message, and Bryan uses _______________ to confirm the digital signature.

  1. Bryan's public key; Bryan's public key
  2. Alice's public key; Alice's public key
  3. Bryan's private key; Alice's public key
  4. Bryan's public key; Alice's public key

Answer(s): D

Explanation:

Alice encrypts with the recipient’s public key to ensure only the intended recipient can decrypt, and the recipient verifies the signature with the signer’s public key. So: encrypt with Bryan’s public key; verify signature with Alice’s public key.
A) Uses Bryan's public key for both encryption and signature verification, which is incorrect because a signature is verified with the signer’s public key, not the recipient’s.
B) Encrypts with Alice’s public key, which would allow anyone with Alice’s private key to decrypt, defeating confidentiality.
C) Uses Bryan’s private key for encryption, which is inappropriate—private keys are not used for encryption of messages meant for confidentiality.
D) Correct: Bryan’s public key for encryption; Alice’s public key for signature verification.



What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

  1. AndroidManifest.xml
  2. classes.dex
  3. APK.info
  4. resources.asrc

Answer(s): A

Explanation:

The correct answer is A) AndroidManifest.xml because it declares activities, services, broadcast receivers, permissions, and application components that define the app’s basic structure and behavior.
B) classes.dex is the compiled Dalvik/ART bytecode containing the app’s classes, not configuration.
C) APK.info is not a standard Android configuration file and doesn’t define components.
D) resources.asrc is not a valid Android file for component configuration; resource references are defined in manifests and XML layouts, not a standalone asrc file.



Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self- extracting RAR file, to retrieve information related to network resources such as writable share drives.

What is the tool employed by Mason in the above scenario?

  1. NetPass.exe
  2. Outlook scraper
  3. WebBrowserPassView
  4. Credential enumerator

Answer(s): D

Explanation:

Emotet spreading via credential harvesting and network propagation aligns with a credential enumerator tool to extract network resource information for lateral movement.
A) NetPass.exe is a legacy Windows password recovery tool, not primarily used for enumerating network shares or resources for lateral movement.
B) Outlook scraper targets email data extraction, not network resource enumeration or propagating malware across networks.
C) WebBrowserPassView retrieves browser-stored passwords, not network resource discovery or share enumeration.
D) Credential enumerator fits as the tool to enumerate credentials and network resources (e.g., writable shares) to facilitate propagation across local networks.



Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

  1. Bluesmacking
  2. Bluesnarfing
  3. Bluejacking
  4. Bluebugging

Answer(s): B

Explanation:

Bluetooth hacking techniques involving unauthorized access to data on a wireless device is bluesnarfing, which targets information theft via Bluetooth without user awareness.
A) Bluesmacking is a denial-focused attack that uses Bluetooth to flood devices with requests or messages, not chiefly data theft.
C) Bluejacking sends unsolicited messages for nuisance or social engineering, not data extraction from the device.
D) Bluebugging exploits Bluetooth to gain extended control, often for covert maintenance or control, but its primary aim isn’t standard data theft from the device’s files. Bluesnarfing directly covers information theft via Bluetooth.



Viewing page 14 of 105
Viewing questions 105 - 112 out of 862 questions


312-50v13 Exam Discussions & Posts (Share your experience with others)

AI Tutor AI Tutor 👋 I’m here to help!