312-50v13 Dumps

312-50v13 Free Practice Test

EC-Council 312-50v13: Certified Ethical Hacker v13

QUESTION 101

- (Topic 2)
How does a denial-of-service attack work?

Correct Answer: A

QUESTION 102

- (Topic 3)
Given below are different steps involved in the vulnerability-management life cycle.
1) Remediation
2) Identify assets and create a baseline
3) Verification
4) Monitor
5) Vulnerability scan
6) Risk assessment
Identify the correct sequence of steps involved in vulnerability management.

Correct Answer: A

QUESTION 103

- (Topic 2)
ViruXine.W32 virus hides their presence by changing the underlying executable code.
This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all.
312-50v13 dumps exhibit
Here is a section of the Virus code:
312-50v13 dumps exhibit
What is this technique called?

Correct Answer: A

QUESTION 104

- (Topic 1)
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer??s software and hardware without the owner??s permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

Correct Answer: C

QUESTION 105

- (Topic 2)
OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?

Correct Answer: C