Free 312-50v13 Exam Braindumps (page: 21)

Page 20 of 79

Ethical hacker Jane Smith is attempting to perform an SQL injection attack. She wants to test the response time of a true or false response and wants to use a second command to determine whether the database will return true or false results for user IDs.
Which two SQL injection types would give her the results she is looking for?

  1. Out of band and boolean-based
  2. Union-based and error-based
  3. Time-based and union-based
  4. Time-based and boolean-based

Answer(s): B



Jason, an attacker, targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL https://xyz.com/feed.php?url=externalsite.com/feed/to to obtain a remote feed and altered the URL input to the local host to view all the local resources on the target server.

What is the type of attack Jason performed in the above scenario?

  1. Web server misconfiguration
  2. Server-side request forgery (SSRF) attack
  3. Web cache poisoning attack
  4. Website defacement

Answer(s): B



George is a security professional working for iTech Solutions. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100 m.

What is the short-range wireless communication technology George employed in the above scenario?

  1. LPWAN
  2. MQTT
  3. NB-IoT
  4. Zigbee

Answer(s): D



Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. Using this technique, he also imposed conditions such that employees can access only the resources required for their role.

What is the technique employed by Eric to secure cloud resources?

  1. Demilitarized zone
  2. Zero trust network
  3. Serverless computing
  4. Container technology

Answer(s): B






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts