EC-Council 312-50v10 Certified Ethical Hacker Exam (C|EH v10) Online Training
EC-Council 312-50v10 Online Training
The questions for 312-50v10 were last updated at Nov 22,2024.
- Exam Code: 312-50v10
- Exam Name: Certified Ethical Hacker Exam (C|EH v10)
- Certification Provider: EC-Council
- Latest update: Nov 22,2024
You are doing an internal security audit and intend to find out what ports are open on all the servers.
What is the best way to find out?
- A . Scan servers with Nmap
- B . Scan servers with MBSA
- C . Telnet to every port on each server
- D . Physically go to each server
Alice encrypts her data using her public key PK and stores the encrypted data in the cloud.
Which of the following attack scenarios will compromise the privacy of her data?
- A . None of these scenarios compromise the privacy of Alice’s data
- B . Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server successfully resists Andrew’s attempt to access the stored data
- C . Hacker Harry breaks into the cloud server and steals the encrypted data
- D . Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before
Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an unsuspecting user’s browser to send malicious requests they did not intend?
- A . Command Injection Attacks
- B . File Injection Attack
- C . Cross-Site Request Forgery (CSRF)
- D . Hidden Field Manipulation Attack
Which of the following is not a Bluetooth attack?
- A . Bluesnarfing
- B . Bluedriving
- C . Bluesmacking
- D . Bluejacking
Which service in a PKI will vouch for the identity of an individual or company?
- A . CBC
- B . KDC
- C . CA
- D . CR
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not matchup.
What is the most likely cause?
- A . The network devices are not all synchronized
- B . Proper chain of custody was not observed while collecting the logs.
- C . The attacker altered or erased events from the logs.
- D . The security breach was a false positive.
You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email and you send her an email changing the source email to her boss’s email(boss@company). In this email you ask for a pdf with information. She reads your email and sends back a pdf with inks. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network.
What testing method did you use?
- A . Social engineering
- B . Piggybacking
- C . Tailgating
- D . Eavesdropping
What is the role of test automation in security testing?
- A . It is an option but it tends to be very expensive.
- B . It should be used exclusively. Manual testing is outdated because of low spend and possible test setup inconsistencies.
- C . Test automation is not usable in security due to the complexity of the tests.
- D . It can accelerate benchmark tests and repeat them with a consistent test setup. But it can not replace manual testing completely.
What is the minimum number of network connections in a multihomed firewall?
- A . 3
- B . 2
- C . 5
- D . 4
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?
- A . White Hat
- B . Suicide Hacker
- C . Gray Hat
- D . Black Hat