Download ECCouncil.312-50v10.CertDumps.2021-05-31.720q.vcex

Download Exam

File Info

Exam Certified Ethical Hacker v10 Exam
Number 312-50v10
File Name ECCouncil.312-50v10.CertDumps.2021-05-31.720q.vcex
Size 5 MB
Posted May 31, 2021
Download ECCouncil.312-50v10.CertDumps.2021-05-31.720q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which of the following is a wireless network detector that is commonly found on Linux?


  1. Kismet
  2. Abel
  3. Netstumbler
  4. Nessus
Correct answer: A



Question 2

A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway. 
This approach can be used to mitigate which kind of attack?


  1. Forensic attack
  2. ARP spoofing attack
  3. Social engineering attack
  4. Scanning attack
Correct answer: C



Question 3

Code injection is a form of attack in which a malicious user:


  1. Inserts text into a data field that gets interpreted as code
  2. Gets the server to execute arbitrary code using a buffer overflow
  3. Inserts additional code into the JavaScript running in the browser
  4. Gains access to the codebase on the server and inserts new code
Correct answer: A



Question 4

Sid is a judge for a programming contest. Before the code reaches him it goes through a restricted OS and is tested there. If it passes, then it moves onto Sid. 
What is this middle step called?


  1. Fuzzy-testing the code
  2. Third party running the code
  3. Sandboxing the code
  4. String validating the code
Correct answer: A



Question 5

The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?


  1. Regularly test security systems and processes.
  2. Encrypt transmission of cardholder data across open, public networks.
  3. Assign a unique ID to each person with computer access.
  4. Use and regularly update anti-virus software on all systems commonly affected by malware.
Correct answer: C



Question 6

Which of the following act requires employer's standard national numbers to identify them on standard transactions?


  1. SOX 
  2. HIPAA
  3. DMCA
  4. PCI-DSS
Correct answer: B



Question 7

Which of the following is an NMAP script that could help detect HTTP Methods such as GET, POST, HEAD, PUT, DELETE, TRACE?


  1. http-git
  2. http-headers
  3. http enum
  4. http-methods
Correct answer: D



Question 8

Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has 
established a session with his computer. How can Fred accomplish this?


  1. Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.
  2. He can send an IP packet with the SYN bit and the source address of his computer.
  3. Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.
  4. Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.
Correct answer: D



Question 9

What is the process of logging, recording, and resolving events that take place in an organization?


  1. Incident Management Process
  2. Security Policy
  3. Internal Procedure
  4. Metrics
Correct answer: A
Explanation:
The activities within the incident management process include:References:https://en.wikipedia.org/wiki/Incident_management_(ITSM)#Incident_management_procedure
The activities within the incident management process include:
References:
https://en.wikipedia.org/wiki/Incident_management_(ITSM)#Incident_management_procedure



Question 10

A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?


  1. The password file does not contain the passwords themselves.
  2. He can open it and read the user ids and corresponding passwords.
  3. The file reveals the passwords to the root user only.
  4. He cannot read it because it is encrypted.
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files