Exam | Certified Ethical Hacker v12 Exam |
Number | 312-50v12 |
File Name | Certified Ethical Hacker.Marks4Sure.312-50v12.v4-0.2023-05-13.1e.238q.vcex |
Size | 3.83 Mb |
Posted | May 13, 2023 |
Downloads | 18 |
Download | Certified Ethical Hacker.Marks4Sure.312-50v12.v4-0.2023-05-13.1e.238q.vcex |
Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.
Coupon: MASTEREXAM
With discount: 20%
What is a “Collision attack” in cryptography?
Correct Answer: D
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
Correct Answer: D
What is a NULL scan?
Correct Answer: A
Which of the following program infects the system boot sector and the executable files at the same time?
Correct Answer: C
Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.
What kind of attack is Susan carrying on?
Correct Answer: C
Which of the following is assured by the use of a hash?
Correct Answer: D
Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?
Correct Answer: D
What did the following commands determine?
Correct Answer: D
During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.
What is this type of DNS configuration commonly called?
Correct Answer: D
Which of the following Linux commands will resolve a domain name into IP address?
Correct Answer: A