Download Certified Ethical Hacker v10 Exam.passcertification.312-50v10.2018-09-30.1e.86q.vcex

Download Dump

File Info

Exam Certified Ethical Hacker v10 Exam
Number 312-50v10
File Name Certified Ethical Hacker v10 Exam.passcertification.312-50v10.2018-09-30.1e.86q.vcex
Size 402 Kb
Posted September 30, 2018
Downloaded 53



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

  • A: nmap –A - Pn
  • B: nmap –sP –p-65535-T5
  • C: nmap –sT –O –T0
  • D: nmap –A --host-timeout 99-T1



Question 2
Bob, your senior colleague, has sent you a mail regarding aa deal with one of the clients. You are requested to accept the offer and you oblige. 
After 2 days, Bob denies that he had ever sent a mail. 
What do you want to “know” to prove yourself that it was Bob who had send a mail?

  • A: Confidentiality
  • B: Integrity
  • C: Non-Repudiation
  • D: Authentication



Question 3
What is attempting an injection attack on a web server based on responses to True/False questions called?

  • A: DMS-specific SQLi
  • B: Compound SQLi
  • C: Blind SQLi
  • D: Classic SQLi



Question 4
The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?

  • A: ACK
  • B: SYN
  • C: RST
  • D: SYN-ACK



Question 5
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?

  • A: Snort
  • B: Nmap
  • C: Cain & Abel
  • D: Nessus



Question 6
Which of the following will perform an Xmas scan using NMAP?

  • A: nmap -sA 192.168.1.254
  • B: nmap -sP 192.168.1.254
  • C: nmap -sX 192.168.1.254
  • D: nmap -sV 192.168.1.254



Question 7
Code injection is a form of attack in which a malicious user:

  • A: Inserts text into a data field that gets interpreted as code
  • B: Gets the server to execute arbitrary code using a buffer overflow
  • C: Inserts additional code into the JavaScript running in the browser
  • D: Gains access to the codebase on the server and inserts new code



Question 8
The collection of potentially actionable, overt, and publicly available information is known as

  • A: Open-source intelligence
  • B: Human intelligence
  • C: Social intelligence
  • D: Real intelligence



Question 9
Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?

  • A: [cache:]
  • B: [site:]
  • C: [inurl:]
  • D: [link:]



Question 10
This asymmetry cipher is based on factoring the product of two large prime numbers. 
What cipher is described above?

  • A: SHA
  • B: RSA
  • C: MD5
  • D: RC5









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset