Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :Certified Ethical Hacker Exam (C|EH v10)
  • Certification
    :CEH v10
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :May 07, 2024

EC-COUNCIL CEH v10 312-50V10 Questions & Answers

  • Question 11:

    What is the minimum number of network connections in a multihomed firewall?

    A. 3

    B. 2

    C. 5

    D. 4

  • Question 12:

    Which definition among those given below best describes a covert channel?

    A. A server program using a port that is not well known.

    B. Making use of a protocol in a way it is not intended to be used.

    C. It is the multiplexing taking place on a communication link.

    D. It is one of the weak channels used by WEP which makes it insecure

  • Question 13:

    What is the purpose of DNS AAAA record?

    A. Authorization, Authentication and Auditing record

    B. Address prefix record

    C. Address database record

    D. IPv6 address resolution record

  • Question 14:

    What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

    A. Copy the system files from a known good system

    B. Perform a trap and trace

    C. Delete the files and try to determine the source

    D. Reload from a previous backup

    E. Reload from known good media

  • Question 15:

    You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles.

    You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to protecting their systems.

    In other words, you are trying to penetrate an otherwise impenetrable system.

    How would you proceed?

    A. Look for "zero-day" exploits at various underground hacker websites in Russia and China and buy the necessary exploits from these hackers and target the bank's network

    B. Try to hang around the local pubs or restaurants near the bank, get talking to a poorly- paid or disgruntled employee, and offer them money if they'll abuse their access privileges by providing you with sensitive information

    C. Launch DDOS attacks against Merclyn Barley Bank's routers and firewall systems using 100, 000 or more "zombies" and "bots"

    D. Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning techniques

  • Question 16:

    Which of the following statements about a zone transfer is correct? (Choose three.)

    A. A zone transfer is accomplished with the DNS

    B. A zone transfer is accomplished with the nslookup service

    C. A zone transfer passes all zone information that a DNS server maintains

    D. A zone transfer passes all zone information that a nslookup server maintains

    E. A zone transfer can be prevented by blocking all inbound TCP port 53 connections

    F. Zone transfers cannot occur on the Internet

  • Question 17:

    You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to. 1.4.0/23. Which of the following IP addresses could be teased as a result of the new configuration?

    A. 210.1.55.200

    B. 10.1.4.254

    C. 10..1.5.200

    D. 10.1.4.156

  • Question 18:

    You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?

    A. Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account

    B. Package the Sales.xls using Trojan wrappers and telnet them back your home computer

    C. You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques

    D. Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account

  • Question 19:

    Which of the following statements is FALSE with respect to Intrusion Detection Systems?

    A. Intrusion Detection Systems can be configured to distinguish specific content in network packets

    B. Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic

    C. Intrusion Detection Systems require constant update of the signature library

    D. Intrusion Detection Systems can examine the contents of the data n context of the network protocol

  • Question 20:

    This TCP flag instructs the sending system to transmit all buffered data immediately.

    A. SYN

    B. RST

    C. PSH

    D. URG

    E. FIN

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.