312-50v10 Premium Bundle

312-50v10 Premium Bundle

Certified Ethical Hacker v10 Certification Exam

4.5 
(41325 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
January 6, 2025Last update

EC-Council 312-50v10 Free Practice Questions

P.S. Approved 312-50v10 lab are available on Google Drive, GET MORE: https://drive.google.com/open?id=11X2yJs-IuI1bJbZ1vrpnms7JbUdqhTcR


New EC-Council 312-50v10 Exam Dumps Collection (Question 3 - Question 12)

Question No: 3

You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for.

Which of the below scanning technique will you use?

A. ACK flag scanning

B. TCP Scanning

C. IP Fragment Scanning

D. Inverse TCP flag scanning

Answer: C


Question No: 4

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

A. nmap u2013A - Pn

B. nmap u2013sP u2013p-65535-T5

C. nmap u2013sT u2013O u2013T0

D. nmap u2013A --host-timeout 99-T1

Answer: C


Question No: 5

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

A. 123

B. 161

C. 69

D. 113

Answer: A


Question No: 6

The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?

A. ACK

B. SYN

C. RST

D. SYN-ACK

Answer: B


Question No: 7

Which of the following is considered as one of the most reliable forms of TCP scanning?

A. TCP Connect/Full Open Scan

B. Half-open Scan

C. NULL Scan

D. Xmas Scan

Answer: A


Question No: 8

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

A. PPP

B. IPSEC

C. PEM

D. SET

Answer: B


Question No: 9

DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus discovering what software is installed.

What command is used to determine if the entry is present in DNS cache?

A. nslookup -fullrecursive update.antivirus.com

B. dnsnooping u2013rt update.antivirus.com

C. nslookup -norecursive update.antivirus.com

D. dns --snoop update.antivirus.com

Answer: C


Question No: 10

In cryptanalysis and computer security, 'pass the hash' is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case.

Metasploit Framework has a module for this technique: psexec. The psexec module is often used by penetration testers to obtain access to a given system whose credentials are known. It was written by

sysinternals and has been integrated within the framework. The penetration testers successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, pwdump, or cachedump and then utilize rainbowtables to crack those hash values.

Which of the following is true hash type and sort order that is used in the psexec module's 'smbpass' option?

A. LM:NT

B. NTLM:LM

C. NT:LM

D. LM:NTLM

Answer: A


Question No: 11

Internet Protocol Security IPSec is actually a suite of protocols. Each protocol within the suite provides different functionality. Collective IPSec does everything except.

A. Work at the Data Link Layer

B. Protect the payload and the headers

C. Encrypt

D. Authenticate

Answer: A


Question No: 12

Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy.

What is the main theme of the sub-policies for Information Technologies?

A. Availability, Non-repudiation, Confidentiality

B. Authenticity, Integrity, Non-repudiation

C. Confidentiality, Integrity, Availability

D. Authenticity, Confidentiality, Integrity

Answer: C


100% Refresh EC-Council 312-50v10 Questions & Answers shared by 2passeasy, Get HERE: https://www.2passeasy.com/dumps/312-50v10/ (New Q&As)


START 312-50v10 EXAM