EC-Council 312-50v10 Certified Ethical Hacker Exam (C|EH v10) Online Training
EC-Council 312-50v10 Online Training
The questions for 312-50v10 were last updated at Nov 23,2024.
- Exam Code: 312-50v10
- Exam Name: Certified Ethical Hacker Exam (C|EH v10)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
You are attempting to man-in-the-middle a session.
Which protocol will allow you to guess a sequence number?
- A . ICMP
- B . TCP
- C . UP X
- D . UPD
Which of the following will perform an Xmas scan using NMAP?
- A . nmap -sA 192.168.1.254
- B . nmap -sP 192.168.1.254
- C . nmap -sX 192.168.1.254
- D . nmap -sV 192.168.1.254
Which command can be used to show the current TCP/IP connections?
- A . Netsh
- B . Net use connection
- C . Netstat
- D . Net use
Which of the following is the least likely physical characteristic to be used in biometric control that supports a large company?
- A . Voice
- B . Fingerprints
- C . Iris patterns
- D . Height and Weight
Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?
- A . [cache:]
- B . [site:]
- C . [inurl:]
- D . [link:]
Jim’s company regularly performs backups of their critical servers. But the company cannot afford to send backup tapes to an off-site vendor for long-term storage and archiving. Instead, Jim’s company keeps the backup tapes in a safe in the office. Jim’s company is audited each year, and the results from this year’s audit show a risk because backup tapes are not stored off-site.
The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?
- A . Encrypt the backup tapes and transport them in a lockbox.
- B . Degauss the backup tapes and transport them in a lockbox.
- C . Hash the backup tapes and transport them in a lockbox.
- D . Encrypt the backup tapes and use a courier to transport them.
Risks=Threats x Vulnerabilities is referred to as the:
- A . BIA equation
- B . Disaster recovery formula
- C . Risk equation
- D . Threat assessment
An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses.
In which order should he perform these steps?
- A . The sequence does not matter. Both steps have to be performed against all hosts.
- B . First the port scan to identify interesting services and then the ping sweep to find hosts responding to icmp echo requests.
- C . First the ping sweep to ident fy live hosts and then the ports canon the live hosts. This way he saves time.
- D . The port scan alone is adequate. This way he saves time.
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?
- A . Place a front-end webserver in a demilitarized zone that only handles external web traffic
- B . Require all employees to change their anti-virus program with a new one
- C . Move the financial data to another server on the same IP subnet
- D . ls sue new certificates to the webservers from the root certificate authority
Which of the following tools can be used for passive OS fingerprinting?
- A . tcpdump
- B . nmap
- C . ping
- D . tracert