Download ECCouncil.312-50v10.BrainDumps.2018-09-12.55q.vcex

Download Exam

File Info

Exam Certified Ethical Hacker v10 Exam
Number 312-50v10
File Name ECCouncil.312-50v10.BrainDumps.2018-09-12.55q.vcex
Size 45 KB
Posted Sep 12, 2018
Download ECCouncil.312-50v10.BrainDumps.2018-09-12.55q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

PGP, SSL, and IKE are all examples of which type of cryptography?


  1. Hash Algorithm
  2. Digest
  3. Secret Key
  4. Public Key
Correct answer: D



Question 2

Which of the following is considered as one of the most reliable forms of TCP scanning? 


  1. TCP Connect/Full Open Scan
  2. Half-open Scan
  3. NULL Scan
  4. Xmas Scan
Correct answer: A
Explanation:



Question 3

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?


  1. ICMP Echo scanning
  2. SYN/FIN scanning using IP fragments
  3. ACK flag probe scanning
  4. IPID scanning
Correct answer: B



Question 4

Which of the following is the BEST way to defend against network sniffing?


  1. Restrict Physical Access to Server Rooms hosting Critical Servers
  2. Use Static IP Address
  3. Using encryption protocols to secure network communications
  4. Register all machines MAC Address in a Centralized Database
Correct answer: C



Question 5

Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP). 
Which of the following is an incorrect definition or characteristics of the protocol?


  1. Based on XML
  2. Only compatible with the application protocol HTTP
  3. Exchanges data between web services
  4. Provides a structured model for messaging 
Correct answer: B



Question 6

You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabled Windows accounts?


  1. John the Ripper
  2. SET
  3. CHNTPW
  4. Cain & Abel
Correct answer: C



Question 7

What type of vulnerability/attack is it when the malicious person forces the user’s browser to send an authenticated request to a server?


  1. Cross-site request forgery
  2. Cross-site scripting
  3. Session hijacking
  4. Server side request forgery
Correct answer: A
Explanation:



Question 8

From the following table, identify the wrong answer in terms of Range (ft). 
  


  1. 802.11b
  2. 802.11g
  3. 802.16(WiMax)
  4. 802.11a
Correct answer: D



Question 9

What would you enter, if you wanted to perform a stealth scan using Nmap? 


  1. nmap -sU
  2. nmap -sS
  3. nmap -sM
  4. nmap -sT
Correct answer: B



Question 10

You are doing an internal security audit and intend to find out what ports are open on all the servers. What is the best way to find out?


  1. Scan servers with Nmap
  2. Scan servers with MBSA
  3. Telnet to every port on each server
  4. Physically go to each server
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files