The Secret Of EC-Council 312-50v10 Training Materials

Your success in EC-Council 312-50v10 is our sole target and we develop all our 312-50v10 braindumps in a way that facilitates the attainment of this target. Not only is our 312-50v10 study material the best you can find, it is also the most detailed and the most updated. 312-50v10 Practice Exams for EC-Council 312-50v10 are written to the highest standards of technical accuracy.

Also have 312-50v10 free dumps questions for you:

Page: 1 / 61
Total 736 questions Full Exam Access
Question 1
- (Exam Topic 4)
You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do fast, efficient searches of the logs you must use regular expressions.
Which command-line utility are you most likely to use?
My answer: -
Reference answer: A
Reference analysis:

grep is a command-line utility for searching plain-text data sets for lines matching a regular expression. References: https://en.wikipedia.org/wiki/Grep

Question 2
- (Exam Topic 1)
During the process of encryption and decryption, what keys are shared? During the process of encryption and decryption, what keys are shared?
My answer: -
Reference answer: C
Reference analysis:

None

Question 3
- (Exam Topic 4)
The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the transport layer security (TLS) protocols defined in RFC6520.
What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?
My answer: -
Reference answer: A
Reference analysis:

The data obtained by a Heartbleed attack may include unencrypted exchanges between TLS parties likely to be confidential, including any form post data in users' requests. Moreover, the confidential data exposed could include authentication secrets such as session cookies and passwords, which might allow attackers to impersonate a user of the service.
An attack may also reveal private keys of compromised parties. References: https://en.wikipedia.org/wiki/Heartbleed

Question 4
- (Exam Topic 7)
Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain.
What do you think Tess King is trying to accomplish? Select the best answer.
My answer: -
Reference answer: B
Reference analysis:

None

Question 5
- (Exam Topic 1)
How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?
My answer: -
Reference answer: D
Reference analysis:

None

Question 6
- (Exam Topic 7)
You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.
Your peer, Peter Smith who works at the same department disagrees with you.
He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.
What is Peter Smith talking about?
My answer: -
Reference answer: A
Reference analysis:

None

Question 7
- (Exam Topic 2)
What is the broadcast address for the subnet 190.86.168.0/22?
My answer: -
Reference answer: C
Reference analysis:

None

Question 8
- (Exam Topic 6)
In order to prevent particular ports and applications from getting packets into an organization, what does a firewall check?
My answer: -
Reference answer: D
Reference analysis:

None

Question 9
- (Exam Topic 7)
How does a denial-of-service attack work?
My answer: -
Reference answer: A
Reference analysis:

None

Question 10
- (Exam Topic 7)
Which of the following are well known password-cracking programs?
My answer: -
Reference answer: AE
Reference analysis:

None

Question 11
- (Exam Topic 4)
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", that the user is directed to a phishing site.
Which file does the attacker need to modify?
My answer: -
Reference answer: A
Reference analysis:

The hosts file is a computer file used by an operating system to map hostnames to IP addresses. The hosts file contains lines of text consisting of an IP address in the first text field followed by one or more host names.
References: https://en.wikipedia.org/wiki/Hosts_(file)

Question 12
- (Exam Topic 2)
Which of the following cryptography attack methods is usually performed without the use of a computer?
My answer: -
Reference answer: C
Reference analysis:

None

Question 13
- (Exam Topic 1)
A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?
My answer: -
Reference answer: D
Reference analysis:

None

Question 14
- (Exam Topic 1)
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
My answer: -
Reference answer: D
Reference analysis:

None

Question 15
- (Exam Topic 2)
A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
My answer: -
Reference answer: C
Reference analysis:

None

Question 16
- (Exam Topic 2)
A security engineer is attempting to map a company’s internal network. The engineer enters in the following NMAP command:
NMAP –n –sS –P0 –p 80 ***.***.**.** What type of scan is this?
My answer: -
Reference answer: C
Reference analysis:

None

Question 17
- (Exam Topic 2)
Pentest results indicate that voice over IP traffic is traversing a network. Which of the following tools will decode a packet capture and extract the voice conversations?
My answer: -
Reference answer: A
Reference analysis:

None

Question 18
- (Exam Topic 5)
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?
My answer: -
Reference answer: A
Reference analysis:

There are several key elements to have implemented in preparation phase in order to help mitigate any potential problems that may hinder one’s ability to handle an incident. For the sake of brevity, the following should be performed:
References: https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901

Question 19
- (Exam Topic 6)
Your next door neighbor, that you do not get along with, is having issues with their network, so he yells to his spouse the network's SSID and password and you hear them both clearly. What do you do with this information?
My answer: -
Reference answer: A
Reference analysis:

None

Question 20
- (Exam Topic 7)
What is a NULL scan?
My answer: -
Reference answer: A
Reference analysis:

None

Question 21
- (Exam Topic 2)
Which command lets a tester enumerate alive systems in a class C network via ICMP using native Windows tools?
My answer: -
Reference answer: D
Reference analysis:

None

Question 22
- (Exam Topic 1)
What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?
My answer: -
Reference answer: D
Reference analysis:

None

Question 23
- (Exam Topic 2)
Which of the following is used to indicate a single-line comment in structured query language (SQL)?
My answer: -
Reference answer: A
Reference analysis:

None

Question 24
- (Exam Topic 6)
A distributed port scan operates by:
My answer: -
Reference answer: D
Reference analysis:

None

Question 25
- (Exam Topic 2)
A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?
My answer: -
Reference answer: C
Reference analysis:

None

Page: 1 / 61
Total 736 questions Full Exam Access