Download Certified Ethical Hacker v10 Exam.CertDumps.312-50v10.2021-04-28.1e.550q.vcex

Download Exam

File Info

Exam Certified Ethical Hacker v10 Exam
Number 312-50v10
File Name Certified Ethical Hacker v10 Exam.CertDumps.312-50v10.2021-04-28.1e.550q.vcex
Size 3.79 Mb
Posted April 28, 2021
Downloads 5

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
Which of the following is a wireless network detector that is commonly found on Linux?

  • A: Kismet
  • B: Abel
  • C: Netstumbler
  • D: Nessus

Question 2
A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway. 
This approach can be used to mitigate which kind of attack?

  • A: Forensic attack
  • B: ARP spoofing attack
  • C: Social engineering attack
  • D: Scanning attack

Question 3
Code injection is a form of attack in which a malicious user:

  • A: Inserts text into a data field that gets interpreted as code
  • B: Gets the server to execute arbitrary code using a buffer overflow
  • C: Inserts additional code into the JavaScript running in the browser
  • D: Gains access to the codebase on the server and inserts new code

Question 4
The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

  • A: Regularly test security systems and processes.
  • B: Encrypt transmission of cardholder data across open, public networks.
  • C: Assign a unique ID to each person with computer access.
  • D: Use and regularly update anti-virus software on all systems commonly affected by malware.

Question 5
Which of the following act requires employer's standard national numbers to identify them on standard transactions?

  • A: SOX 
  • B: HIPAA
  • C: DMCA
  • D: PCI-DSS

Question 6
Which of the following is an NMAP script that could help detect HTTP Methods such as GET, POST, HEAD, PUT, DELETE, TRACE?

  • A: http-git
  • B: http-headers
  • C: http enum
  • D: http-methods

Question 7
Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has 
established a session with his computer. How can Fred accomplish this?

  • A: Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.
  • B: He can send an IP packet with the SYN bit and the source address of his computer.
  • C: Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.
  • D: Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.

Question 8
What is the process of logging, recording, and resolving events that take place in an organization?

  • A: Incident Management Process
  • B: Security Policy
  • C: Internal Procedure
  • D: Metrics

Question 9
A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?

  • A: The password file does not contain the passwords themselves.
  • B: He can open it and read the user ids and corresponding passwords.
  • C: The file reveals the passwords to the root user only.
  • D: He cannot read it because it is encrypted.

Question 10
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?

  • A: Set a BIOS password.
  • B: Encrypt the data on the hard drive.
  • C: Use a strong logon password to the operating system.
  • D: Back up everything on the laptop and store the backup in a safe place.


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files