Free 312-50v13 Exam Braindumps (page: 22)

Page 21 of 79

You are a penetration tester tasked with testing the wireless network of your client Brakeme SA. You are attempting to break into the wireless network with the SSID “Brakeme-Internal.” You realize that this network uses WPA3 encryption.

Which of the following vulnerabilities is the promising to exploit?

  1. Cross-site request forgery
  2. Dragonblood
  3. Key reinstallation attack
  4. AP misconfiguration

Answer(s): B



What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne?

  1. White-hat hacking program
  2. Bug bounty program
  3. Ethical hacking program
  4. Vulnerability hunting program

Answer(s): C



A DDoS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete.

Which attack is being described here?

  1. Desynchronization
  2. Slowloris attack
  3. Session splicing
  4. Phlashing

Answer(s): B



Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network.

Which of the following host discovery techniques must he use to perform the given task?

  1. UDP scan
  2. ARP ping scan
  3. ACK flag probe scan
  4. TCP Maimon scan

Answer(s): C






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts