EC-Council 312-50v10 Certified Ethical Hacker Exam (C|EH v10) Online Training
EC-Council 312-50v10 Online Training
The questions for 312-50v10 were last updated at Nov 23,2024.
- Exam Code: 312-50v10
- Exam Name: Certified Ethical Hacker Exam (C|EH v10)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
Your business has decided to add credit card numbers to the data it backs up to tape.
Which of the following represents the best practice your business should observe?
- A . Do not backup either the credit card numbers or their hashes.
- B . Encrypt backup tapes that are sent off-site.
- C . Backup the hashes of the credit card numbers not the actual credit card numbers.
- D . Hire a security consultant to provide direction.
This international organization regulates bi lions of transactions daily and provides security guidelines to protect personally identifiable information (PI). These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach.
Which of the following organization is being described?
- A . Institute of Electrical and Electronics Engineers (IEEE)
- B . International Security Industry Organization (ISIO)
- C . Center for Disease Control (CDC)
- D . Payment Card Industry (PCI)
Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS) flaws in software applications?
- A . Use security policies and procedures to define and implement proper security settings.
- B . Use digital certificates to authenticate a server prior to sending data
- C . Validate and escape all information sent to a server.
- D . Verify access right before allowing access to protected information and Ul controls.
Which security strategy requires using several varying methods to protect IT systems against attacks?
- A . Defense in depth
- B . Covert channels
- C . Exponential backoff algorithm
- D . Three-way handshake
Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?
- A . PKI
- B . SOA
- C . biometrics
- D . single sign on
You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/ 8 and 192.168.0.0/8.
While monitoring the data, you find a high number of outbound connections. You see that IP’s owned by XYZ (Internal) and private IP’s are communicating to a Single Public IP. Therefore, the Internal IP’s are sending data to the Public IP.
After further analysis, you find out that this Public I Pisa blacklisted IP, and the internal communicating devices are compromised.
What kind of attack does the above scenario depict?
- A . Botnet Attack
- B . Spear Phishing Attack
- C . Advanced Persistent Threats
- D . Rootkit Attack
John the Ripper is a technical assessment tool used to test the weakness of which of the following?
- A . Usernames
- B . File permissions
- C . Firewall rulesets
- D . Passwords
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing-Reports https://ibt1.prometric.com/users/custom/reportqueue/rgstr…corporate network.
What tool should the analyst use to perform a Blackjacking attack?
- A . Paros Proxy
- B . BBProxy
- C . Bloover
- D . BBCrack
It is a regulation that has a set of guidelines, which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep patient data secure.
Which of the following regulations best matches the description?
- A . FISMA
- B . ISO/IEC 27002
- C . HIPAA
- D . COBIT
A company’s security policy states that all Web browsers must automatically delete their HTTP browser
cookies upon terminating.
What sort of security breach is this policy attempting to mitigate?
- A . Attempts by attackers to access the user and password information stored in the company’s
- B . Attempts by attackers to access Websites that trust the Web browser user by stealing the
- C . Attempts by attackers to access password stored on the user’s computer without the user’s
- D . Attempts by attackers to determine the user’s Web browser usage patterns, including when