Free 312-50v13 Practice Test Questions 2026

551 Questions


Last Updated On : 26-Mar-2026


Topic 1 : Exam Pool A

Which of the following is a component of a risk assessment?


A. Administrative safeguards


B. Physical security


C. DMZ


D. Logical interface





A.
  Administrative safeguards

A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.
However, he is unable to capture any logons though he knows that other users are logging in.
What do you think is the most likely reason behind this?


A. There is a NIDS present on that segment.


B. Kerberos is preventing it.


C. Windows logons cannot be sniffed.


D. L0phtcrack only sniffs logons to web servers.





B.
  Kerberos is preventing it.

What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?


A. 110


B. 135


C. 139


D. 161


E. 445


F. 1024





B.
  135

C.
  139

E.
  445

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing?


A. Install DNS logger and track vulnerable packets


B. Disable DNS timeouts


C. Install DNS Anti-spoofing


D. Disable DNS Zone Transfer





C.
  Install DNS Anti-spoofing

Which of the following is not a Bluetooth attack?


A. Bluedriving


B. Bluesmacking


C. Bluejacking


D. Bluesnarfing





A.
  Bluedriving

What is a NULL scan?


A. A scan in which all flags are turned off


B. A scan in which certain flags are off


C. A scan in which all flags are on


D. A scan in which the packet size is set to zero


E. A scan with an illegal packet size





A.
  A scan in which all flags are turned off

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What Wireshark filter will show the connections from the snort machine to kiwi syslog machine?


A. tcp.srcport= = 514 && ip.src= = 192.168.0.99


B. tcp.srcport= = 514 && ip.src= = 192.168.150


C. tcp.dstport= = 514 && ip.dst= = 192.168.0.99


D. tcp.dstport= = 514 && ip.dst= = 192.168.0.150





D.
  tcp.dstport= = 514 && ip.dst= = 192.168.0.150

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.
What kind of attack is Susan carrying on?


A. A sniffing attack


B. A spoofing attack


C. A man in the middle attack


D. A denial of service attack





C.
  A man in the middle attack

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?


A. Kismet


B. Abel


C. Netstumbler


D. Nessus





A.
  Kismet

What is the minimum number of network connections in a multihomed firewall?


A. 3


B. 5


C. 4


D. 2





A.
  3

During a black-box pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic?


A. Circuit


B. Stateful


C. Application


D. Packet Filtering





C.
  Application

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?


A. tcpsplice


B. Burp


C. Hydra


D. Whisker





D.
  Whisker


Page 6 out of 46 Pages
PreviousNext
1234567891011121314
312-50v13 Practice Test Home

What Makes Our Certified Ethical Hacker Exam CEHv13 Practice Test So Effective?

Real-World Scenario Mastery: Our 312-50v13 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.

Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Certified Ethical Hacker Exam CEHv13 exam day arrives.

Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive 312-50v13 practice exam questions pool covering all topics, the real exam feels like just another practice session.