Exam Details

  • Exam Code
    :312-50V7
  • Exam Name
    :Ethical Hacking and Countermeasures (CEHv7)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :514 Q&As
  • Last Updated
    :Jun 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V7 Questions & Answers

  • Question 201:

    What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?

    A. Set a BIOS password.

    B. Encrypt the data on the hard drive.

    C. Use a strong logon password to the operating system.

    D. Back up everything on the laptop and store the backup in a safe place.

  • Question 202:

    The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?

    A. Investigate based on the maintenance schedule of the affected systems.

    B. Investigate based on the service level agreements of the systems.

    C. Investigate based on the potential effect of the incident.

    D. Investigate based on the order that the alerts arrived in.

  • Question 203:

    A corporation hired an ethical hacker to test if it is possible to obtain users' login credentials using methods other than social engineering. Access to offices and to a network node is granted. Results from server scanning indicate all are adequately patched and physical access is denied, thus, administrators have access only through Remote Desktop. Which technique could be used to obtain login credentials?

    A. Capture every users' traffic with Ettercap.

    B. Capture LANMAN Hashes and crack them with LC6.

    C. Guess passwords using Medusa or Hydra against a network service.

    D. Capture administrators RDP traffic and decode it with Cain and Abel.

  • Question 204:

    A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?

    A. Ignore the problem completely and let someone else deal with it.

    B. Create a document that will crash the computer when opened and send it to friends.

    C. Find an underground bulletin board and attempt to sell the bug to the highest bidder.

    D. Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix.

  • Question 205:

    How is sniffing broadly categorized?

    A. Active and passive

    B. Broadcast and unicast

    C. Unmanaged and managed

    D. Filtered and unfiltered

  • Question 206:

    An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?

    A. g++ hackersExploit.cpp -o calc.exe

    B. g++ hackersExploit.py -o calc.exe

    C. g++ -i hackersExploit.pl -o calc.exe

    D. g++ --compile i hackersExploit.cpp -o calc.exe

  • Question 207:

    How can a rootkit bypass Windows 7 operating system's kernel mode, code signing policy?

    A. Defeating the scanner from detecting any code change at the kernel

    B. Replacing patch system calls with its own version that hides the rootkit (attacker's) actions

    C. Performing common services for the application process and replacing real applications with fake ones

    D. Attaching itself to the master boot record in a hard drive and changing the machine's boot sequence/options

  • Question 208:

    A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

    A. Perform a vulnerability scan of the system.

    B. Determine the impact of enabling the audit feature.

    C. Perform a cost/benefit analysis of the audit feature.

    D. Allocate funds for staffing of audit log review.

  • Question 209:

    A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the

    A. P.'s computer. What is the consultant's obligation to the financial organization?

    B. Say nothing and continue with the security testing.

    C. Stop work immediately and contact the authorities.

    D. Delete the pornography, say nothing, and continue security testing.

    E. Bring the discovery to the financial organization's human resource department.

  • Question 210:

    Which of the following guidelines or standards is associated with the credit card industry?

    A. Control Objectives for Information and Related Technology (COBIT)

    B. Sarbanes-Oxley Act (SOX)

    C. Health Insurance Portability and Accountability Act (HIPAA)

    D. Payment Card Industry Data Security Standards (PCI DSS)

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V7 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.