Free 312-50v13 Exam Braindumps (page: 16)

Page 15 of 79

This form of encryption algorithm is a symmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?

  1. HMAC encryption algorithm
  2. Twofish encryption algorithm
  3. IDEA
  4. Blowfish encryption algorithm

Answer(s): B



Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources.

What is the attack technique used by Jude for finding loopholes in the above scenario?

  1. Spoofed session flood attack
  2. UDP flood attack
  3. Peer-to-peer attack
  4. Ping-of-death attack

Answer(s): A



Jim, a professional hacker, targeted an organization that is operating critical industrial infrastructure. Jim used Nmap to scan open ports and running services on systems connected to the organization’s OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered information such as the vendor name, product code and name, device name, and IP address.

Which of the following Nmap commands helped Jim retrieve the required information?

  1. nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >
  2. nmap -Pn -sU -p 44818 --script enip-info < Target IP >
  3. nmap -Pn -sT -p 46824 < Target IP >
  4. nmap -Pn -sT -p 102 --script s7-info < Target IP >

Answer(s): B



While testing a web application in development, you notice that the web server does not properly ignore the “dot dot slash” (../) character string and instead returns the file listing of a folder higher up in the folder structure of the server.

What kind of attack is possible in this scenario?

  1. Cross-site scripting
  2. SQL injection
  3. Denial of service
  4. Directory traversal

Answer(s): D






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts