312-50V10 Exam Dumps Updated With Latest Certified Ethical Hacker Exam Preparation Questions

Use the latest Certified Ethical Hack exam preparation questions, practice the 312-50v10 exam and pass easily. We have just updated the 312-50V10 exam dumps with the latest 312-50V10 exam preparation questions that you can go to.

passitdump.com the latest 312-50V10 exam dumps preparation questions will take you through the Certified Ethical Hacker Exam (C|EH v10).

The following questions and answers are from the latest 312-50V10 free dumps. It will help you understand the validity of the latest 312-50V10 dumps.

Question 1:

Which of the following is an adaptive SQL Injection testing technique used to discover coding errors by inputting massive amounts of random data and observing the changes in the output?

A. Function Testing

B. Dynamic Testing

C. Static Testing

D. Fuzzing Testing

Correct Answer: D


Question 2:

Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server?

The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.

A. My Doom

B. Astacheldraht

C. R-U-Dead-Yet?(RUDY)

D. LOIC

Correct Answer: C


Question 3:

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?

A. Nmap

B. Cain and Abel

C. Nessus

D. Snort

Correct Answer: D


Question 4:

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

A. Omnidirectional antenna

B. Dipole antenna

C. Yagi antenna

D. Parabolic grid antenna

Correct Answer: C


Question 5:

What is the purpose of a demilitarized zone on a network?

A. To scan all traffic coming through the DMZ to the internal network

B. To only provide direct access to the nodes within the DMZ and protect the network behind it

C. To provide a place to put the honeypot

D. To contain the network devices you wish to protect

Correct Answer: B


Question 6:

Which is the first step followed by Vulnerability Scanners for scanning a network?

A. TCP/UDP Port scanning

B. Firewall detection

C. OS Detection

D. Checking if the remote host is alive

Correct Answer: D


Question 7:

Insecure direct object reference is a type of vulnerability where the application does not verify if the user is authorized to access the internal object via its name or key.

Suppose a malicious user Rob tries to get access to the account of a benign user Ned.

Which of the following requests best illustrates an attempt to exploit an insecure direct object reference vulnerability?

A. “GET/restricted/goldtransfer?to=Robandfrom=1 or 1=1\’ HTTP/1.1Host: westbank.com”

B. “GET/restricted/accounts/?name=Ned HTTP/1.1 Host: westbank.com”

C. “GET/restricted/bank.getaccount(`Ned\’) HTTP/1.1 Host: westbank.com”

D. “GET/restricted/\r\n\accountNedaccess HTTP/1.1 Host: westbank.com”

Correct Answer: B


Question 8:

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

A. Keyed Hashing

B. Key Stretching

C. Salting

D. Double Hashing

Correct Answer: C


Question 9:

The network team has well-established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it. What would be a good step to have in the procedures for a situation like this?

A. Have the network team document the reason why the rule was implemented without prior manager approval.

B. Monitor all traffic using the firewall rule until a manager can approve it.

C. Do not roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

D. Immediately roll back the firewall rule until a manager can approve it

Correct Answer: D


Question 10:

Trinity needs to scan all hosts on a /16 network for TCP port 445 only. What is the fastest way she can accomplish this with Nmap? Stealth is not a concern.

A. nmap -sn -sF 10.1.0.0/16 445

B. nmap -p 445 -n -T4 –open 10.1.0.0/16

C. nmap -s 445 -sU -T5 10.1.0.0/16

D. nmap -p 445 –max -Pn 10.1.0.0/16

Correct Answer: B


Question 11:

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

A. All three servers need to be placed internally

B. A web server facing the Internet, an application server on the internal network, a database server on the internal network

C. A web server and the database server facing the Internet, an application server on the internal network

D. All three servers need to face the Internet so that they can communicate between themselves

Correct Answer: B


Question 12:

You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?

A. ACK flag scanning

B. TCP Scanning

C. IP Fragment Scanning

D. Inverse TCP flag scanning

Correct Answer: C


Question 13:

Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.

He identified this when the IDS alerted for malware activities in the network.

What should Bob do to avoid this problem?

A. Disable unused ports in the switches

B. Separate students in a different VLAN

C. Use the 802.1x protocol

D. Ask students to use the wireless network

Correct Answer: C


Question 14:

Which of the following is the best countermeasure to encrypting ransomwares?

A. Use multiple antivirus softwares

B. Keep some generation of off-line backup

C. Analyze the ransomware to get decryption key of encrypted data

D. Pay a ransom

Correct Answer: B


Question 15:

Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it\’s true positive or false positive. Looking at the logs he copy and paste basic details like below:

source IP: 192.168.21.100

source port: 80

destination IP: 192.168.10.23

destination port: 63221

What is the most proper answer.

A. This is most probably true negative.

B. This is most probably true positive which triggered on secure communication between client and server.

C. This is most probably false-positive, because an alert triggered on reversed traffic.

D. This is most probably false-positive because IDS is monitoring one direction traffic.

Correct Answer: A