Download Certified Ethical Hacker (312-50v9).312-50.SelfTestEngine.2018-11-25.325q.vcex

Vendor: ECCouncil
Exam Code: 312-50
Exam Name: Certified Ethical Hacker (312-50v9)
Date: Nov 25, 2018
File Size: 1 MB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which property ensures that a hash function will not produce the same hashed value for two different messages? 
  1. Collision resistance
  2. Bit length
  3. Key strength
  4. Entropy
Correct answer: A
Question 2
How can telnet be used to fingerprint a web server?
  1. telnet webserverAddress 80 
    HEAD / HTTP/1.0
  2. telnet webserverAddress 80 
    PUT / HTTP/1.0
  3. telnet webserverAddress 80 
    HEAD / HTTP/2.0
  4. telnet webserverAddress 80 
    PUT / HTTP/2.0
Correct answer: A
Explanation:
Question 3
Low humidity in a data center can cause which of the following problems?
  1. Heat
  2. Corrosion
  3. Static electricity
  4. Airborne contamination
Correct answer: C
Question 4
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?
  1. Man trap
  2. Tailgating
  3. Shoulder surfing
  4. Social engineering
Correct answer: B
Question 5
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's computer to update the router configuration. What type of an alert is this? 
  1. False positive
  2. False negative
  3. True positve
  4. True negative
Correct answer: A
Question 6
While performing data validation of web content, a security technician is required to restrict malicious input. 
Which of the following processes is an efficient way of restricting malicious input?
  1. Validate web content input for query strings.
  2. Validate web content input with scanning tools.
  3. Validate web content input for type, length, and range.
  4. Validate web content input for extraneous queries.
Correct answer: C
Question 7
A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway.  
This approach can be used to mitigate which kind of attack?
  1. Forensic attack
  2. ARP spoofing attack
  3. Social engineering attack
  4. Scanning attack
Correct answer: C
Question 8
Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?
  1. Metasploit scripting engine
  2. Nessus scripting engine
  3. NMAP scripting engine
  4. SAINT scripting engine
Correct answer: C
Question 9
Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?
  1. Microsoft Security Baseline Analyzer
  2. Retina
  3. Core Impact
  4. Microsoft Baseline Security Analyzer 
Correct answer: D
Explanation:
Question 10
A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?
  1. Firewall-management policy
  2. Acceptable-use policy
  3. Remote-access policy
  4. Permissive policy
Correct answer: C
Question 11
Which property ensures that a hash function will not produce the same hashed value for two different messages? 
  1. Collision resistance
  2. Bit length
  3. Key strength
  4. Entropy
Correct answer: A
Question 12
How can telnet be used to fingerprint a web server?
  1. telnet webserverAddress 80 
    HEAD / HTTP/1.0
  2. telnet webserverAddress 80 
    PUT / HTTP/1.0
  3. telnet webserverAddress 80 
    HEAD / HTTP/2.0
  4. telnet webserverAddress 80 
    PUT / HTTP/2.0
Correct answer: A
Explanation:
Question 13
Low humidity in a data center can cause which of the following problems?
  1. Heat
  2. Corrosion
  3. Static electricity
  4. Airborne contamination
Correct answer: C
Question 14
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?
  1. Man trap
  2. Tailgating
  3. Shoulder surfing
  4. Social engineering
Correct answer: B
Question 15
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's computer to update the router configuration. What type of an alert is this? 
  1. False positive
  2. False negative
  3. True positve
  4. True negative
Correct answer: A
Question 16
While performing data validation of web content, a security technician is required to restrict malicious input. 
Which of the following processes is an efficient way of restricting malicious input?
  1. Validate web content input for query strings.
  2. Validate web content input with scanning tools.
  3. Validate web content input for type, length, and range.
  4. Validate web content input for extraneous queries.
Correct answer: C
Question 17
A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway.  
This approach can be used to mitigate which kind of attack?
  1. Forensic attack
  2. ARP spoofing attack
  3. Social engineering attack
  4. Scanning attack
Correct answer: C
Question 18
Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?
  1. Metasploit scripting engine
  2. Nessus scripting engine
  3. NMAP scripting engine
  4. SAINT scripting engine
Correct answer: C
Question 19
Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?
  1. Microsoft Security Baseline Analyzer
  2. Retina
  3. Core Impact
  4. Microsoft Baseline Security Analyzer 
Correct answer: D
Explanation:
Question 20
A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?
  1. Firewall-management policy
  2. Acceptable-use policy
  3. Remote-access policy
  4. Permissive policy
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!