Exam Code: 312-50v13
Exam Questions: 576
Certified Ethical Hacker V13
Updated: 24 Nov, 2025
Viewing Page : 1 - 58
Practicing : 1 - 5 of 576 Questions
Question 1

You are the lead cybersecurity analyst at a multinational corporation that uses a hybrid encryption system to secure inter-departmental communications. The system uses RSA encryption for key exchange and AES for data encryption, taking advantage of the strengths of both asymmetric and symmetric encryption. Each RSA key pair has a size of 'n' bits, with larger keys providing more security at the cost of slower performance. Thetime complexity of generating an RSA key pair is O(n*2), and AES encryption has a time complexity of O(n).

An attacker has developed a quantum algorithm with time complexity O((log n)*2) to crack RSA encryption.

Given *n=4000' and variable ‘AES key size’, which scenario is likely to provide the best balance of security

and

performance? which scenario would provide the best balance of security and performance?

Options :
Answer: C

Question 2

Taylor, a security professional, uses a tool to monitor her company's website, analyze the website's traffic, and track the geographical location of the users visiting the company's website. Which of the following tools did Taylor employ in the above scenario?

Options :
Answer: B

Question 3

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

Options :
Answer: C

Question 4

What tool can crack Windows SMB passwords simply by listening to network traffic? 

Options :
Answer: D

Question 5

While testing a web application in development, you notice that the web server does not properly ignore the “dot dot slash” (../) character string and instead returns the file listing of a folder structure of the server. What kind of attack is possible in this scenario?

Options :
Answer: D

Viewing Page : 1 - 58
Practicing : 1 - 5 of 576 Questions

© Copyrights FreePDFQuestions 2025. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.