312-50v10 Premium Bundle

312-50v10 Premium Bundle

Certified Ethical Hacker v10 Certification Exam

4.5 
(40860 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
January 6, 2025Last update

EC-Council 312-50v10 Free Practice Questions

P.S. Download 312-50v10 courses are available on Google Drive, GET MORE: https://drive.google.com/open?id=11X2yJs-IuI1bJbZ1vrpnms7JbUdqhTcR


New EC-Council 312-50v10 Exam Dumps Collection (Question 6 - Question 15)

Question No: 6

On performing a risk assessment, you need to determine the potential impacts when some of the critical business process of the company interrupt its service. What is the name of the process by which you can determine those critical business?

A. Risk Mitigation

B. Emergency Plan Response (EPR)

C. Disaster Recovery Planning (DRP)

D. Business Impact Analysis (BIA)

Answer: D


Question No: 7

How does the Address Resolution Protocol (ARP) work?

A. It sends a request packet to all the network elements, asking for the domain name from a specific IP.

B. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.

C. It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.

D. It sends a reply packet for a specific IP, asking for the MAC address.

Answer: B


Question No: 8

Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the following attack scenarios will compromise the privacy of her data?

A. None of these scenarios compromise the privacy of Aliceu2021s data

B. Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server successfully resists Andrewu2021s attempt to access the stored data

C. Hacker Harry breaks into the cloud server and steals the encrypted data

D. Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before

Answer: D


Question No: 9

What is the least important information when you analyze a public IP address in a security alert?

A. ARP

B. Whois

C. DNS

D. Geolocation

Answer: A


Question No: 10

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

A. Reverse Social Engineering

B. Tailgating

C. Piggybacking

D. Announced

Answer: B


Question No: 11

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

A camera captures people walking and identifies the individuals using Steveu2021s approach.

After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:

A. Although the approach has two phases, it actually implements just one authentication factor

B. The solution implements the two authentication factors: physical object and physical characteristic

C. The solution will have a high level of false positives

D. Biological motion cannot be used to identify people

Answer: B


Question No: 12

What does the option * indicate?

A. s

B. t

C. n

D. a

Answer: C


Question No: 13

Code injection is a form of attack in which a malicious user:

A. Inserts text into a data field that gets interpreted as code

B. Gets the server to execute arbitrary code using a buffer overflow

C. Inserts additional code into the JavaScript running in the browser

D. Gains access to the codebase on the server and inserts new code

Answer: A


Question No: 14

Assume a business-crucial web-site of some company that is used to sell handsets to the customers worldwide. All the developed components are reviewed by the security team on a monthly basis. In order to drive business further, the web-site developers decided to add some 3rd party marketing tools on it. The tools are written in JavaScript and can track the customeru2021s activity on the site. These tools are located on the servers of the marketing company.

What is the main security risk associated with this scenario?

A. External script contents could be maliciously modified without the security team knowledge

B. External scripts have direct access to the company servers and can steal the data from there

C. There is no risk at all as the marketing services are trustworthy

D. External scripts increase the outbound company data traffic which leads greater financial losses

Answer: A


Question No: 15

Which of these is capable of searching for and locating rogue access points?

A. HIDS

B. NIDS

C. WISS

D. WIPS

Answer: D


100% Down to date EC-Council 312-50v10 Questions & Answers shared by Dumpscollection, Get HERE: http://www.dumpscollection.net/dumps/312-50v10/ (New Q&As)


START 312-50v10 EXAM