EC-Council 312-50v10 Certified Ethical Hacker Exam (C|EH v10) Online Training
EC-Council 312-50v10 Online Training
The questions for 312-50v10 were last updated at Nov 22,2024.
- Exam Code: 312-50v10
- Exam Name: Certified Ethical Hacker Exam (C|EH v10)
- Certification Provider: EC-Council
- Latest update: Nov 22,2024
As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic.
What command in Wireshark will help you to find this kind of traffic?
- A . request smtp 25
- B . tcp.port eq 25
- C . smtp port
- D . tcp.contains port 25
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to"www.MyPersonalBank.com", that the user is directed to a phishing site.
Which file does the attacker need to modify?
- A . Boot.ini
- B . Sudoers
- C . Networks
- D . Hosts
Which type of security features tops vehicles from crashing through the doors of a building?
- A . Turnstile
- B . Bollards
- C . Man trap
- D . Receptionist
Log monitoring tools performing behavioral analysis have alerted several suspicious login son a Linux server occuring during non-business hours. After further examination of all login activities, it is notices that
none of the logins have occurred during typical work hours. A Linux administrator who is investigating this
problem realized the system time on the Linux server is wrong by more than twelve hours.
What protocol used on Linux serves to synchronize the time has stopped working?
- A . NTP
- B . TimeKeeper
- C . OSPF
- D . PPP
An enterprise recent y moved to a new of ice and the new neighborhood is a littler is risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours.
What is the best option to do this job?
- A . Use fences in the entrance doors.
- B . Install a CCTV with cameras pointing to the entrance doors and the street
- C . Use an IDS in the entrance doors and install some of them near the corners.
- D . Use lights in all the entrance doors and along the company’s perimeter.
Bob, a network administrator at Big University, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students. He identified this when the IDS alerted for malware activities in the network.
What should Bob do to avoid this problem?
- A . Disable unused ports in the switches
- B . Separate students in a different VLAN
- C . Use the 802.1x protocol
- D . Ask students to use the wireless network
Which is the first step followed by Vulnerability Scanners for scanning a network?
- A . TCP/UDP Port scanning
- B . Firewall detection
- C . OS Detection
- D . Checking if the remote host is alive
Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy.
What is the main theme of the sub-policies for Information Technologies?
- A . Availability, Non-repudiation, Confidentiality
- B . Authenticity, Integrity, Non-repudiation
- C . Confidentiality, Integrity, Availability
- D . Authenticity, Confidentiality, Integrity
The "Gray-box testing" methodology enforces what kind of restriction?
- A . Only the internal operation of a system is known to the tester.
- B . The internal operation of a system is completely known to the tester.
- C . The internal operation of a system is only partly accessible to the tester
- D . Only the external operation of a system is accessible to the tester.
Which results will be returned with the following Google search query? site: target.com site: Marketing target.com accounting
- A . Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.
- B . Results matching all words in the query.
- C . Results for matches on target.com and Marketing,target.com that include the word "accounting"
- D . Results matching "accounting" in domain target.com but not on the site Marketing.target.com