EC-Council 312-50v10 Certified Ethical Hacker Exam (C|EH v10) Online Training
EC-Council 312-50v10 Online Training
The questions for 312-50v10 were last updated at Oct 31,2025.
- Exam Code: 312-50v10
 - Exam Name: Certified Ethical Hacker Exam (C|EH v10)
 - Certification Provider: EC-Council
 - Latest update: Oct 31,2025
 
You are attempting to man-in-the-middle a session.
Which protocol will allow you to guess a sequence number?
- A . ICMP
 - B . TCP
 - C . UP X
 - D . UPD
 
Which of the following will perform an Xmas scan using NMAP?
- A . nmap -sA 192.168.1.254
 - B . nmap -sP 192.168.1.254
 - C . nmap -sX 192.168.1.254
 - D . nmap -sV 192.168.1.254
 
Which command can be used to show the current TCP/IP connections?
- A . Netsh
 - B . Net use connection
 - C . Netstat
 - D . Net use
 
Which of the following is the least likely physical characteristic to be used in biometric control that supports a large company?
- A . Voice
 - B . Fingerprints
 - C . Iris patterns
 - D . Height and Weight
 
Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?
- A . [cache:]
 - B . [site:]
 - C . [inurl:]
 - D . [link:]
 
Jim’s company regularly performs backups of their critical servers. But the company cannot afford to send backup tapes to an off-site vendor for long-term storage and archiving. Instead, Jim’s company keeps the backup tapes in a safe in the office. Jim’s company is audited each year, and the results from this year’s audit show a risk because backup tapes are not stored off-site.
The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?
- A . Encrypt the backup tapes and transport them in a lockbox.
 - B . Degauss the backup tapes and transport them in a lockbox.
 - C . Hash the backup tapes and transport them in a lockbox.
 - D . Encrypt the backup tapes and use a courier to transport them.
 
Risks=Threats x Vulnerabilities is referred to as the:
- A . BIA equation
 - B . Disaster recovery formula
 - C . Risk equation
 - D . Threat assessment
 
An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses.
In which order should he perform these steps?
- A . The sequence does not matter. Both steps have to be performed against all hosts.
 - B . First the port scan to identify interesting services and then the ping sweep to find hosts responding to icmp echo requests.
 - C . First the ping sweep to ident fy live hosts and then the ports canon the live hosts. This way he saves time.
 - D . The port scan alone is adequate. This way he saves time.
 
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?
- A . Place a front-end webserver in a demilitarized zone that only handles external web traffic
 - B . Require all employees to change their anti-virus program with a new one
 - C . Move the financial data to another server on the same IP subnet
 - D . ls sue new certificates to the webservers from the root certificate authority
 
Which of the following tools can be used for passive OS fingerprinting?
- A . tcpdump
 - B . nmap
 - C . ping
 - D . tracert