Pinpoint EC-Council 312-50v10 Testing Bible Online

Act now and download your EC-Council 312-50v10 test today! Do not waste time for the worthless EC-Council 312-50v10 tutorials. Download Up to the minute EC-Council Certified Ethical Hacker v10 exam with real questions and answers and begin to learn EC-Council 312-50v10 with a classic professional.

Online 312-50v10 free questions and answers of New Version:

Page: 1 / 61
Total 736 questions Full Exam Access
Question 1
- (Exam Topic 3)
What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
My answer: -
Reference answer: D
Reference analysis:

None

Question 2
- (Exam Topic 3)
Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?
My answer: -
Reference answer: A
Reference analysis:

None

Question 3
- (Exam Topic 5)
What mechanism in Windows prevents a user from accidentally executing a potentially malicious batch (.bat) or PowerShell (.ps1) script?
My answer: -
Reference answer: B
Reference analysis:

None

Question 4
- (Exam Topic 7)
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?
My answer: -
Reference answer: B
Reference analysis:

None

Question 5
- (Exam Topic 1)
What does the -oX flag do in an Nmap scan?
My answer: -
Reference answer: D
Reference analysis:

None

Question 6
- (Exam Topic 3)
Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?
My answer: -
Reference answer: D
Reference analysis:

None

Question 7
- (Exam Topic 5)
You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?
My answer: -
Reference answer: A
Reference analysis:

A false negative error, or in short false negative, is where a test result indicates that a condition failed, while it actually was successful. I.e. erroneously no effect has been assumed.
References: https://en.wikipedia.org/wiki/False_positives_and_false_negatives#False_negative_error

Question 8
- (Exam Topic 6)
Which service in a PKI will vouch for the identity of an individual or company?
My answer: -
Reference answer: B
Reference analysis:

None

Question 9
- (Exam Topic 4)
You've just been hired to perform a pen test on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk.
What is one of the first things you should do when given the job?
My answer: -
Reference answer: A
Reference analysis:

The goals of penetration tests are:
References: https://en.wikipedia.org/wiki/Penetration_test

Question 10
- (Exam Topic 5)
To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.
What term is commonly used when referring to this type of testing?
My answer: -
Reference answer: A
Reference analysis:

Fuzz testing or fuzzing is a software testing technique, often automated or semi-automated, that involves providing invalid, unexpected, or random data to the inputs of a computer program. The program is then monitored for exceptions such as crashes, or failing built-in code assertions or for finding potential memory leaks. Fuzzing is commonly used to test for security problems in software or computer systems. It is a form of random testing which has been used for testing hardware or software.
References: https://en.wikipedia.org/wiki/Fuzz_testing

Question 11
- (Exam Topic 7)
Within the context of Computer Security, which of the following statements describes Social Engineering best?
My answer: -
Reference answer: C
Reference analysis:

None

Question 12
- (Exam Topic 2)
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
My answer: -
Reference answer: B
Reference analysis:

None

Question 13
- (Exam Topic 4)
You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.
What is the best nmap command you will use?
My answer: -
Reference answer: A
Reference analysis:

command = nmap -T4 -F
description = This scan is faster than a normal scan because it uses the aggressive timing template and scans fewer ports.
References: https://svn.nmap.org/nmap/zenmap/share/zenmap/config/scan_profile.usp

Question 14
- (Exam Topic 3)
Which of the following descriptions is true about a static NAT?
My answer: -
Reference answer: D
Reference analysis:

None

Question 15
- (Exam Topic 1)
Assume a business-crucial web-site of some company that is used to sell handsets to the customers worldwide. All the developed components are reviewed by the security team on a monthly basis. In order to drive business further, the web-site developers decided to add some 3rd party marketing tools on it. The tools are written in JavaScript and can track the customer’s activity on the site. These tools are located on the servers of the marketing company.
What is the main security risk associated with this scenario?
My answer: -
Reference answer: A
Reference analysis:

None

Question 16
- (Exam Topic 7)
Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing?
My answer: -
Reference answer: C
Reference analysis:

None

Question 17
- (Exam Topic 4)
Which of the following is a design pattern based on distinct pieces of software providing application functionality as services to other applications?
My answer: -
Reference answer: A
Reference analysis:

A service-oriented architecture (SOA) is an architectural pattern in computer software design in which application components provide services to other components via a communications protocol, typically over a network.
References: https://en.wikipedia.org/wiki/Service-oriented_architecture

Question 18
- (Exam Topic 7)
If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?
My answer: -
Reference answer: B
Reference analysis:

None

Question 19
- (Exam Topic 2)
Least privilege is a security concept that requires that a user is
My answer: -
Reference answer: A
Reference analysis:

None

Question 20
- (Exam Topic 6)
The chance of a hard drive failure is known to be once every four years. The cost of a new hard drive is $500. EF (Exposure Factor) is about 0.5. Calculate for the Annualized Loss Expectancy (ALE).
My answer: -
Reference answer: A
Reference analysis:

None

Question 21
- (Exam Topic 3)
If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
- (Exam Topic 7)
What is the proper response for a NULL scan if the port is open?
My answer: -
Reference answer: F
Reference analysis:

None

Question 23
- (Exam Topic 5)
An attacker gains access to a Web server's database and displays the contents of the table that holds all of the names, passwords, and other user information. The attacker did this by entering information into the Web site's user login page that the software's designers did not expect to be entered. This is an example of what kind of software design problem?
My answer: -
Reference answer: A
Reference analysis:

The most common web application security weakness is the failure to properly validate input coming from the client or from the environment before using it. This weakness leads to almost all of the major vulnerabilities in web applications, such as cross site scripting, SQL injection, interpreter injection, locale/Unicode attacks, file system attacks, and buffer overflows.
References: https://www.owasp.org/index.php/Testing_for_Input_Validation

Question 24
- (Exam Topic 5)
What is the correct process for the TCP three-way handshake connection establishment and connection termination?
My answer: -
Reference answer: D
Reference analysis:

None

Question 25
- (Exam Topic 2)
Which of the following is a detective control?
My answer: -
Reference answer: C
Reference analysis:

None

Page: 1 / 61
Total 736 questions Full Exam Access