Spring Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 11
Total 162 questions
Exam Code: 312-50v13                Update: Feb 28, 2026
Exam Name: Certified Ethical Hacker Exam (CEHv13)

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Exam Dumps: Updated Questions & Answers (March 2026)

Question # 1

A penetration tester is attempting to gain access to a wireless network that is secured with WPA2 encryption. The tester successfully captures the WPA2 handshake but now needs to crack the pre-shared key. What is the most effective method to proceed?

A.

Perform a brute-force attack using common passwords against the captured handshake

B.

Use a dictionary attack against the captured WPA2 handshake to crack the key

C.

Execute a SQL injection attack on the router's login page

D.

Conduct a de-authentication attack to disconnect all clients from the network

Question # 2

A tester evaluates a login form that constructs SQL queries using unsanitized user input. By submitting 1 OR 'T'='T'; --, the tester gains unauthorized access to the application. What type of SQL injection has occurred?

A.

Tautology-based SQL injection

B.

Error-based SQL injection

C.

Union-based SQL injection

D.

Time-based blind SQL injection

Question # 3

During a late-night shift at IronWave Logistics in Seattle, cybersecurity analyst Marcus Chen notices a pattern of high-port outbound traffic from over a dozen internal machines to a previously unseen external IP. Each system had recently received a disguised shipping report, which, when opened, initiated a process that spread autonomously to other workstations using shared folders and stolen credentials. Upon investigation, Marcus discovers that the machines now contain hidden executables that silently accept remote instructions and occasionally trigger coordinated background tasks. The compromised endpoints are behaving like zombies, and malware analysts confirm that the payload used worm-like propagation to deliver a backdoor component across the network.

Which is the most likely objective behind this attack?

A.

To exfiltrate sensitive information and tracking data

B.

To execute a ransomware payload and encrypt all data

C.

To establish a botnet for remote command and control

D.

To deploy a Remote Access Trojan (RAT) for stealthy surveillance

Question # 4

A web application returns generic error messages. The analyst submits AND 1=1 and AND 1=2 and observes different responses. What type of injection is being tested?

A.

UNION-based SQL injection

B.

Error-based SQL injection

C.

Boolean-based blind SQL injection

D.

Time-based blind SQL injection

Question # 5

During an internal assessment, a penetration tester gains access to a hash dump containing NTLM password hashes from a compromised Windows system. To crack the passwords efficiently, the tester uses a high-performance CPU setup with Hashcat, attempting millions of password combinations per second. Which technique is being optimized in this scenario?

A.

Spoof NetBIOS to impersonate a file server

B.

Leverage hardware acceleration for cracking speed

C.

Dump SAM contents for offline password retrieval

D.

Exploit dictionary rules with appended symbols

Question # 6

A critical flaw exists in a cloud provider’s API. What is the most likely threat?

A.

Physical security breaches

B.

Unauthorized access to cloud resources

C.

DDoS attacks

D.

Compromise of encrypted data at rest

Question # 7

An attacker analyzes how small changes in plaintext input affect ciphertext output to deduce encryption key patterns in a symmetric algorithm. What technique is being used?

A.

Differential cryptanalysis

B.

Timing attack

C.

Chosen-ciphertext attack

D.

Brute-force attack

Question # 8

During a penetration test at Triangle FinTech in Raleigh, North Carolina, ethical hacker Ethan attempts to bypass the company's perimeter firewall. Instead of sending obvious malicious payloads, he encapsulates his traffic inside standard web requests on port 80, blending in with normal browsing activity. This method allows his packets to slip past perimeter defenses that are not performing deep application inspection.

Which firewall evasion technique is Ethan most likely using?

A.

HTTP Tunneling

B.

Source Routing

C.

Tiny Fragments

D.

DNS Tunneling

Question # 9

A penetration tester submits altered ciphertexts to a web server and pays close attention to how the server responds. When the server produces different error messages for certain inputs, the tester starts to infer which inputs result in valid internal processing. Which cryptanalytic method is being used in this scenario?

A.

Exploit padding error feedback to recover data

B.

Compare traffic timing to deduce the key

C.

Flip bits randomly to scramble the decryption

D.

Inspect randomness across multiple sessions

Question # 10

During a red team exercise, a Certified Ethical Hacker (CEH) is attempting to exploit a potential vulnerability in a target organization’s web server. The CEH has completed the information gathering and footprinting phases and has mirrored the website for offline analysis. It has also been discovered that the server is vulnerable to session hijacking. Which of the following steps is most likely to be part of a successful attack methodology while minimizing the possibility of detection?

A.

Hijack an active session and immediately modify server configuration files.

B.

Attempt SQL injection to extract sensitive database information.

C.

Perform vulnerability scanning using automated tools to identify additional weaknesses.

D.

Launch a direct brute-force attack to crack the server’s administrative password.

Question # 11

As part of a red team campaign against a pharmaceutical company in Boston, ethical hacker Alex begins with a successful spear-phishing attack that delivers an initial payload to a manager's laptop. After gaining access, Alex pivots to harvesting cached credentials and using them to move laterally across the internal network. Soon, routers, printers, and several file servers are compromised, expanding the red team's control beyond the original host. At this point, Alex has not yet targeted sensitive research data, but the team has built a broader foothold within the environment.

Which phase of the Advanced Persistent Threat (APT) lifecycle is Alex simulating?

A.

Initial Intrusion

B.

Persistence

C.

Search & Exfiltration

D.

Expansion

Question # 12

On July 9, 2025, during a security penetration test at MedSecure Health in Phoenix, Arizona, the ethical hacking team evaluates the resilience of the company's patient portal system. Ethical hacker Aisha Khan initiates a controlled test that generates sustained traffic pressure against the web application servers. As system responsiveness declines, the IT operations team reallocates backend resources, suspending lower-priority modules such as system alerts and notification services, allowing high-priority functions like prescription refills and patient check-ins to remain accessible. Aisha’s controlled simulation is designed to assess the IT team’s ability to maintain critical functionality under partial resource exhaustion.

What DoS DDoS countermeasure strategies is Aisha’s exercise primarily simulating?

Question # 13

An IoT traffic light shows anomalous traffic to an external IP and has an open port. What should be your next step?

A.

Attempt reverse connections

B.

Isolate the device and investigate firmware

C.

Modify firewall rules only

D.

Conduct full network penetration testing

Question # 14

In the bustling digital marketplace of Miami's tech corridor, ethical hacker Sofia Alvarez probes the virtual defenses of RetailRush, a US-based online retailer hosting thousands of daily transactions. Tasked with exposing weaknesses in the web server's URL processing, Sofia submits crafted requests to manipulate resource paths. Her tests uncover a severe flaw: the server grants access to restricted system files, exposing sensitive configuration data. Further scrutiny reveals the issue stems from the server's failure to validate input paths, not from header manipulation, cached content tampering, or credential compromise. Committed to hardening the platform, Sofia drafts a precise report to direct the security team toward immediate fixes.

Which web server attack type is Sofia most likely exploiting in RetailRush's web server?

A.

Directory Traversal Attack

B.

Web Cache Poisoning Attack

C.

HTTP Response Splitting Attack

D.

Password Cracking Attack

Question # 15

During a routine software update at Horizon Solutions, a mid-sized IT firm in Raleigh, North Carolina, an employee downloads a file utility from a popular third-party site to streamline document processing. During the installation, the user is prompted to install an optional “productivity toolbar” and a “system optimization tool,” which are bundled with vague descriptions. Shortly after, the employee notices intermittent pop-up ads, an altered browser homepage, and sluggish PC performance, though network logs also show occasional unexplained data transfers during off-hours. A security scan flags the additional programs as potentially harmful, but a deeper analysis reveals no immediate file encryption or self-replicating code.

What type of threat are these unwanted programs most likely classified as?

A.

Potentially Unwanted Applications (PUAs)

B.

Worms

C.

Botnet agents

D.

Logic bombs

Page: 1 / 11
Total 162 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 01 Mar 2026