Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :Certified Ethical Hacker Exam (C|EH v10)
  • Certification
    :CEH v10
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :May 07, 2024

EC-COUNCIL CEH v10 312-50V10 Questions & Answers

  • Question 731:

    In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

    A. Keyed Hashing

    B. Key Stretching

    C. Salting

    D. Double Hashing

  • Question 732:

    You are looking for SQL injection vulnerability by sending a special character to web applications. Which of the following is the most useful for quick validation?

    A. Double quotation

    B. Backslash

    C. Semicolon

    D. Single quotation

  • Question 733:

    Company XYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of Company XYZ. The employee of Company XYZ is aware of your test.

    Your email message looks like this:

    From: [email protected]

    To: [email protected]

    Subject: Test message

    Date: 4/3/2017 14:37

    The employee of Company XYZ receives your email message. This proves that Company XYZ's email gateway doesn't prevent what?

    A. Email Phishing

    B. Email Masquerading

    C. Email Spoofing

    D. Email Harvesting

  • Question 734:

    Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide the real traffic. What type of method is Sam using to evade IDS?

    A. Denial-of-Service

    B. False Positive Generation

    C. Insertion Attack

    D. Obfuscating

  • Question 735:

    Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?

    A. –T0

    B. –T5

    C. -O

    D. -A

  • Question 736:

    Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days. Bob denies that he had ever sent a mail. What do you want to ""know"" to prove yourself that it was Bob who had send a mail?

    A. Authentication

    B. Confidentiality

    C. Integrity

    D. Non-Repudiation

  • Question 737:

    Which is the first step followed by Vulnerability Scanners for scanning a network?

    A. TCP/UDP Port scanning

    B. Firewall detection

    C. OS Detection

    D. Checking if the remote host is alive

  • Question 738:

    Insecure direct object reference is a type of vulnerability where the application does not verify if the user is authorized to access the internal object via its name or key.

    Suppose a malicious user Rob tries to get access to the account of a benign user Ned.

    Which of the following requests best illustrates an attempt to exploit an insecure direct object reference vulnerability?

    A. "GET/restricted/goldtransfer?to=Robandfrom=1 or 1=1' HTTP/1.1Host: westbank.com"

    B. "GET/restricted/accounts/?name=Ned HTTP/1.1 Host: westbank.com"

    C. "GET/restricted/bank.getaccount(`Ned') HTTP/1.1 Host: westbank.com"

    D. "GET/restricted/\r\n\%00account%00Ned%00access HTTP/1.1 Host: westbank.com"

  • Question 739:

    In the field of cryptanalysis, what is meant by a "rubber-hose" attack?

    A. Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.

    B. Extraction of cryptographic secrets through coercion or torture.

    C. Forcing the targeted key stream through a hardware-accelerated device such as an ASIC.

    D. A backdoor placed into a cryptographic algorithm by its creator.

  • Question 740:

    What is the purpose of a demilitarized zone on a network?

    A. To scan all traffic coming through the DMZ to the internal network

    B. To only provide direct access to the nodes within the DMZ and protect the network behind it

    C. To provide a place to put the honeypot

    D. To contain the network devices you wish to protect

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.