EC-Council 312-50v10 Certified Ethical Hacker Exam (C|EH v10) Online Training
EC-Council 312-50v10 Online Training
The questions for 312-50v10 were last updated at Nov 23,2024.
- Exam Code: 312-50v10
- Exam Name: Certified Ethical Hacker Exam (C|EH v10)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
Which of the following is considered as one of the most reliable forms of TCP scanning?
- A . TCP Connect/Full Open Scan
- B . Half-open Scan
- C . NULL Scan
- D . Xmas Scan
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated webpages to inject client-side script into webpages viewed by other users.
- A . SQL injection attack
- B . Cross-Site Scripting (XSS)
- C . LDAP Injection attack
- D . Cross-Site Request Forgery (CSRF)
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
- A . 123
- B . 161
- C . 69
- D . 113
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities.
Which type of virus detection method did Chandler use in this context?
- A . Heuristic Analysis
- B . Code Emulation
- C . Integrity checking
- D . Scanning
As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.
What document describes the specifics of the testing, the associated violations, and essentially protects both the organization’s interest and your liabilities as a tester?
- A . Service Level Agreement
- B . Project Scope
- C . Rules of Engagement
- D . Non-Disclosure Agreement
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
- A . AH promiscuous
- B . ESP transport mode
- C . AH Tunnel mode
- D . ESP confidential
A technician is re soling an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24.
Which of the following has occurred?
- A . The computer is not using a private IP address.
- B . The gateway is not routing to a public IP address
- C . The gateway and the computer are not on the same network.
- D . The computer is using an invalid IP address.
You are monitoring the network of your organizations.
You notice that:
– There are huge outbound connections from your Internal Network to External IPs.
– On further investigation, you see that the External IPs are blacklisted.
– Some connections are accepted, and some are dropped.
– You find that it is a CnC communication.
Which of the following solution will you suggest?
- A . Block the Blacklist lP’s @ Firewall
- B . Update the Latest Signatures on your IDS/IPS
- C . Clean the Malware which are trying to Communicate with the External Blacklist IP’s
- D . Block the Blacklist IP’s @ Firewall as well as Clean the Malware which are trying to Communicate with the External Blacklist IP’s.
Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message w thin an or diary message. The technique provides ‘security through obscurity’.
What technique is Ricardo using?
- A . Encryption
- B . Steganography
- C . RSA algorithm
- D . Public-key cryptography
The Heart bleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160.This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.
What type of key does this bug leave exposed to the Internet making exploitation of any compromised
system very easy?
- A . Public
- B . Private
- C . Shared
- D . Root