312-50v10 Premium Bundle

312-50v10 Premium Bundle

Certified Ethical Hacker v10 Certification Exam

4.5 
(41940 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
January 6, 2025Last update

EC-Council 312-50v10 Free Practice Questions

P.S. Tested 312-50v10 preparation labs are available on Google Drive, GET MORE: https://drive.google.com/open?id=1Eru4mEcUV0ULWTU_25JjeXA4U_MAK122


New EC-Council 312-50v10 Exam Dumps Collection (Question 7 - Question 16)

Q1. Which is the first step followed by Vulnerability Scanners for scanning a network?

A. TCP/UDP Port scanning

B. Firewall detection

C. OS Detection

D. Checking if the remote host is alive

Answer: D


Q2. Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.

Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.

In this context, what can you say?

A. Bob can be right since DMZ does not make sense when combined with stateless firewalls

B. Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one

C. Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations

D. Bob is partially right. DMZ does not make sense when a stateless firewall is available

Answer: C


Q3. Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?

A. [cache:]

B. [site:]

C. [inurl:]

D. [link:]

Answer: B


Q4. PGP, SSL, and IKE are all examples of which type of cryptography?

A. Hash Algorithm

B. Digest

C. Secret Key

D. Public Key

Answer: D


Q5. You perform a scan of your companyu2021s network and discover that TCP port 123 is open. What services by default run on TCP port 123?

A. Telnet

B. POP3

C. Network Time Protocol

D. DNS

Answer: C


Q6. What would you enter, if you wanted to perform a stealth scan using Nmap?

A. nmap -sU

B. nmap -sS

C. nmap -sM

D. nmap -sT

Answer: B


Q7. What is not a PCI compliance recommendation?

A. Use a firewall between the public network and the payment card data.

B. Use encryption to protect all transmission of card holder data over any public network.

C. Rotate employees handling credit card transactions on a yearly basis to different departments.

D. Limit access to card holder data to as few individuals as possible.

Answer: C


Q8. Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules.

Which of the following types of firewalls can protect against SQL injection attacks?

A. Data-driven firewall

B. Stateful firewall

C. Packet firewall

D. Web application firewall

Answer: D


Q9. What type of vulnerability/attack is it when the malicious person forces the useru2021s browser to send an authenticated request to a server?

A. Cross-site request forgery

B. Cross-site scripting

C. Session hijacking

D. Server side request forgery

Answer: A


Q10. A virus that attempts to install itself inside the file it is infecting is called?

A. Tunneling virus

B. Cavity virus

C. Polymorphic virus

D. Stealth virus

Answer: B


100% Update EC-Council 312-50v10 Questions & Answers shared by Surepassexam, Get HERE: https://www.surepassexam.com/312-50v10-exam-dumps.html (New Q&As)


START 312-50v10 EXAM