Online Access Free 312-50v13 Practice Test

Exam Code:312-50v13
Exam Name:Certified Ethical Hacker Exam (CEHv13)
Certification Provider:ECCouncil
Free Question Number:569
Posted:Sep 08, 2025
Rating
100%

Question 1

ViruXine.W32 virus hides its presence by changing the underlying executable code. This virus code mutates while keeping the original algorithm intact - the code changes itself each time it runs, but the function of the code (its semantics) does not change at all.

Here is a section of the virus code (refer to image), where the loop performs XOR encryption and changes the way the code looks every time it is executed.

What is this technique called?

Question 2

You're the security manager for a tech company that uses a database to store sensitive customer data. You have implemented countermeasures against SQL injection attacks. Recently, you noticed some suspicious activities and suspect an attacker is using SQL injection techniques. The attacker is believed to use different forms of payloads in his SQL queries. In the case of a successful SQL injection attack, which of the following payloads would have the most significant impact?

Question 3

If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST, what do you know about the firewall you are scanning?

Question 4

What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?

Question 5

A well-resourced attacker intends to launch a highly disruptive DDoS attack against a major online retailer.
The attacker aims to exhaust all the network resources while keeping their identity concealed. Their method should be resistant to simple defensive measures such as IP-based blocking. Based on these objectives, which of the following attack strategies would be most effective?

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.