Abreast Of The Times 312-50v10 Study Guides For Certified Ethical Hacker V10 Certification

Act now and download your EC-Council 312-50v10 test today! Do not waste time for the worthless EC-Council 312-50v10 tutorials. Download Latest EC-Council Certified Ethical Hacker v10 exam with real questions and answers and begin to learn EC-Council 312-50v10 with a classic professional.

Check 312-50v10 free dumps before getting the full version:

Page: 1 / 61
Total 736 questions Full Exam Access
Question 1
- (Exam Topic 7)
MX record priority increases as the number increases. (True/False.)
My answer: -
Reference answer: B
Reference analysis:

None

Question 2
- (Exam Topic 3)
What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
My answer: -
Reference answer: D
Reference analysis:

None

Question 3
- (Exam Topic 4)
Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.
What should you do?
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
- (Exam Topic 1)
You are looking for SQL injection vulnerability by sending a special character to web applications. Which of the following is the most useful for quick validation?
My answer: -
Reference answer: D
Reference analysis:

None

Question 5
- (Exam Topic 4)
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
My answer: -
Reference answer: A
Reference analysis:

When transport mode is used, IPSec encrypts only the IP payload. Transport mode provides the protection of an IP payload through an AH or ESP header. Encapsulating Security Payload (ESP) provides confidentiality (in addition to authentication, integrity, and anti-replay protection) for the IP payload.

Question 6
- (Exam Topic 2)
The use of technologies like IPSec can help guarantee the following: authenticity, integrity, confidentiality and
My answer: -
Reference answer: A
Reference analysis:

None

Question 7
- (Exam Topic 4)
After trying multiple exploits, you've gained root access to a Centos 6 server. To ensure you maintain access, what would you do first?
My answer: -
Reference answer: A
Reference analysis:

None

Question 8
- (Exam Topic 2)
A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
My answer: -
Reference answer: C
Reference analysis:

None

Question 9
- (Exam Topic 3)
Company A and Company B have just merged and each has its own Public Key Infrastructure (PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company?
My answer: -
Reference answer: B
Reference analysis:

None

Question 10
- (Exam Topic 4)
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", that the user is directed to a phishing site.
Which file does the attacker need to modify?
My answer: -
Reference answer: A
Reference analysis:

The hosts file is a computer file used by an operating system to map hostnames to IP addresses. The hosts file contains lines of text consisting of an IP address in the first text field followed by one or more host names.
References: https://en.wikipedia.org/wiki/Hosts_(file)

Question 11
- (Exam Topic 7)
What is a NULL scan?
My answer: -
Reference answer: A
Reference analysis:

None

Question 12
- (Exam Topic 4)
It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data.
Which of the following terms best matches the definition?
My answer: -
Reference answer: A
Reference analysis:

A threat is at any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.
References: https://en.wikipedia.org/wiki/Threat_(computer)

Question 13
- (Exam Topic 1)
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities.
Which type of virus detection method did Chandler use in this context?
My answer: -
Reference answer: B
Reference analysis:

None

Question 14
- (Exam Topic 6)
Which type of cryptography does SSL, IKE and PGP belongs to?
My answer: -
Reference answer: D
Reference analysis:

None

Question 15
- (Exam Topic 5)
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
My answer: -
Reference answer: B
Reference analysis:

None

Question 16
- (Exam Topic 3)
Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
My answer: -
Reference answer: A
Reference analysis:

None

Question 17
- (Exam Topic 4)
Which of the following is the greatest threat posed by backups?
My answer: -
Reference answer: D
Reference analysis:

If the data written on the backup media is properly encrypted, it will be useless for anyone without the key.
References:
http://resources.infosecinstitute.com/backup-media-encryption/

Question 18
- (Exam Topic 2)
A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?
My answer: -
Reference answer: C
Reference analysis:

None

Question 19
- (Exam Topic 5)
A company's security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?
My answer: -
Reference answer: A
Reference analysis:

Cookies can store passwords and form content a user has previously entered, such as a credit card number or an address.
Cookies can be stolen using a technique called cross-site scripting. This occurs when an attacker takes advantage of a website that allows its users to post unfiltered HTML and JavaScript content.
References: https://en.wikipedia.org/wiki/HTTP_cookie#Cross-site_scripting_.E2.80.93_cookie_theft

Question 20
- (Exam Topic 4)
When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it.
What should you do?
My answer: -
Reference answer: A
Reference analysis:

By setting up an email address for your users to forward any suspicious email to, the emails can be automatically scanned and replied to, with security incidents created to follow up on any emails with attached malware or links to known bad websites.
References:
https://docs.servicenow.com/bundle/helsinki-security-management/page/product/threat-intelligence/task/t_Confi

Question 21
- (Exam Topic 6)
Security and privacy of/on information systems are two entities that requires lawful regulations. Which of the following regulations defines security and privacy controls for Federal information systems and organizations?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
- (Exam Topic 6)
Which of the following is a vulnerability in GNU’s bash shell (discovered in September of 2014) that gives attackers access to run remote commands on a vulnerable system?
My answer: -
Reference answer: A
Reference analysis:

None

Question 23
- (Exam Topic 7)
A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.
However, he is unable to capture any logons though he knows that other users are logging in. What do you think is the most likely reason behind this?
My answer: -
Reference answer: B
Reference analysis:

None

Question 24
- (Exam Topic 1)
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?
My answer: -
Reference answer: C
Reference analysis:

None

Question 25
- (Exam Topic 6)
What are two things that are possible when scanning UDP ports? (Choose two.)
My answer: -
Reference answer: BE
Reference analysis:

None

Question 26
- (Exam Topic 6)
What does a type 3 code 13 represent? (Choose two.)
My answer: -
Reference answer: BD
Reference analysis:

None

Question 27
- (Exam Topic 5)
When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?
My answer: -
Reference answer: C
Reference analysis:

None

Question 28
- (Exam Topic 2)
A penetration tester was hired to perform a penetration test for a bank. The tester began searching for IP ranges owned by the bank, performing lookups on the bank's DNS servers, reading news articles online about the bank, watching what times the bank employees come into work and leave from work, searching the bank's job postings (paying special attention to IT related jobs), and visiting the local dumpster for the bank's corporate office. What phase of the penetration test is the tester currently in?
My answer: -
Reference answer: D
Reference analysis:

None

Question 29
- (Exam Topic 2)
Which of the following is an application that requires a host application for replication?
My answer: -
Reference answer: D
Reference analysis:

Computer viruses infect a variety of different subsystems on their hosts. A computer virus is a malware that, when executed, replicates by reproducing itself or infecting other programs by modifying them. Infecting computer programs can include as well, data files, or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected".
References: https://en.wikipedia.org/wiki/Computer_virus

Question 30
- (Exam Topic 5)
The company ABC recently contracted a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. What of the following options can be useful to ensure the integrity of the data?
My answer: -
Reference answer: B
Reference analysis:

None

Page: 1 / 61
Total 736 questions Full Exam Access