Free 312-50v13 Exam Braindumps (page: 18)

Page 17 of 79

Which IOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?

  1. Tethered jailbreaking
  2. Semi-untethered jailbreaking
  3. Semi-tethered jailbreaking
  4. Untethered jailbreaking

Answer(s): D



Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections.

Which of the following attack techniques is used by Stella to compromise the web services?

  1. Web services parsing attacks
  2. WS-Address spoofing
  3. SOAPAction spoofing
  4. XML injection

Answer(s): B



Attacker Steve targeted an organization’s network with the aim of redirecting the company’s web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities in the DNS server software and modified the original IP address of the target website to that of a fake website.

What is the technique employed by Steve to gather information for identity theft?

  1. Pharming
  2. Skimming
  3. Pretexting
  4. Wardriving

Answer(s): A



What is the port to block first in case you are suspicious that an IoT device has been compromised?

  1. 22
  2. 48101
  3. 80
  4. 443

Answer(s): B






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts