Download Certified Ethical Hacker v10 Exam.312-50v10.PracticeTest.2018-10-09.54q.vcex

Vendor: ECCouncil
Exam Code: 312-50v10
Exam Name: Certified Ethical Hacker v10 Exam
Date: Oct 09, 2018
File Size: 46 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
PGP, SSL, and IKE are all examples of which type of cryptography?
  1. Hash Algorithm
  2. Digest
  3. Secret Key
  4. Public Key
Correct answer: D
Question 2
Which of the following is considered as one of the most reliable forms of TCP scanning?
  1. TCP Connect/Full Open Scan
  2. Half-open Scan
  3. NULL Scan
  4. Xmas Scan
Correct answer: A
Question 3
Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?
  1. ICMP Echo scanning
  2. SYN/FIN scanning using IP fragments
  3. ACK flag probe scanning
  4. IPID scanning
Correct answer: B
Question 4
Which of the following is the BEST way to defend against network sniffing?
  1. Restrict Physical Access to Server Rooms hosting Critical Servers
  2. Use Static IP Address
  3. Using encryption protocols to secure network communications
  4. Register all machines MAC Address in a Centralized Database
Correct answer: C
Question 5
Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP). Which of the following is an incorrect definition or characteristics of the protocol?
  1. Based on XML
  2. Only compatible with the application protocol HTTP
  3. Exchanges data between web services
  4. Provides a structured model for messaging
Correct answer: B
Question 6
You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabled Windows accounts?
  1. John the Ripper
  2. SET
  4. Cain & Abel
Correct answer: C
Question 7
What type of vulnerability/attack is it when the malicious person forces the user’s browser to send an authenticated request to a server?
  1. Cross-site request forgery
  2. Cross-site scripting
  3. Session hijacking
  4. Server side request forgery
Correct answer: A
Question 8
From the following table, identify the wrong answer in terms of Range (ft). 
  1. 802.11b
  2. 802.11g
  3. 802.16(WiMax)
  4. 802.11a
Correct answer: D
Question 9
What would you enter, if you wanted to perform a stealth scan using Nmap?
  1. nmap -sU
  2. nmap -sS
  3. nmap -sM
  4. nmap -sT
Correct answer: B
Question 10
You are doing an internal security audit and intend to find out what ports are open on all the servers. What is the best way to find out?
  1. Scan servers with Nmap
  2. Scan servers with MBSA
  3. Telnet to every port on each server
  4. Physically go to each server
Correct answer: A

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!