Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :Certified Ethical Hacker Exam (C|EH v10)
  • Certification
    :CEH v10
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :Apr 28, 2024

EC-COUNCIL CEH v10 312-50V10 Questions & Answers

  • Question 1:

    Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?

    A. Scanning

    B. Footprinting

    C. Enumeration

    D. System Hacking

  • Question 2:

    To reach a bank web site, the traffic from workstations must pass through a firewall. You have been asked to review the firewall configuration to ensure that workstations in network 10.10.10.0/24 can only reach the

    bank web site 10.20.20.1 using https.

    Which of the following firewall rules meets this requirement?

    A. If (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 443) then permit

    B. If (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 80 or 443) then permit

    C. If (source matches 10.20.20.1 and destination matches 10.10.10.0/24 and port matches 443) then permit

    D. If (source matches 10.10.10.0 and destination matches 10.20.20.1 and port matches 443) then permit

  • Question 3:

    Jim's company regularly performs backups of their critical servers. But the company cannot afford to send backup tapes to an off-site vendor for long-term storage and archiving. Instead, Jim's company keeps the backup tapes in a safe in the office. Jim's company is audited each year, and the results from this year's audit show a risk because backup tapes are not stored off-site. The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?

    A. Encrypt the backup tapes and transport them in a lock box.

    B. Degauss the backup tapes and transport them in a lock box.

    C. Hash the backup tapes and transport them in a lock box.

    D. Encrypt the backup tapes and use a courier to transport them.

  • Question 4:

    What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

    A. Man-in-the-middle attack

    B. Meet-in-the-middle attack

    C. Replay attack

    D. Traffic analysis attack

  • Question 5:

    Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has decreased to 10%. The risk threshold for the application is 20%. Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?

    A. Accept the risk

    B. Introduce more controls to bring risk to 0%

    C. Mitigate the risk

    D. Avoid the risk

  • Question 6:

    Which of the following Linux commands will resolve a domain name into IP address?

    A. >host-t a hackeddomain.com

    B. >host-t ns hackeddomain.com

    C. >host -t soa hackeddomain.com

    D. >host -t AXFR hackeddomain.com

  • Question 7:

    User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?

    A. Application

    B. Transport

    C. Session

    D. Presentation

  • Question 8:

    Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?

    A. Exploration

    B. Investigation

    C. Reconnaissance

    D. Enumeration

  • Question 9:

    Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?

    A. IPsec

    B. SFTP

    C. FTPS

    D. SSL

  • Question 10:

    Why is a penetration test considered to be more thorough than vulnerability scan?

    A. Vulnerability scans only do host discovery and port scanning by default.

    B. A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.

    C. It is not ?a penetration test is often performed by an automated tool, while a vulnerability scan requires active engagement.

    D. The tools used by penetration testers tend to have much more comprehensive vulnerability databases.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.